[1]Halpern J, Teague V. Rational secret sharing and multiparty computation[C] Proc of Annual ACM Symp on Theory of Computing. New York: ACM, 2004: 623632[2]Maleka S, Shareef A, Rangan U. Rational secret sharing with repeated games[C] Proc of the 4th Int Conf on Information Security Practice and Experience. Berlin: Springer, 2008: 334346[3]Fuchsbauer G, Katz J, Naccache D. Efficient rational secret sharing in standard communication networks[C] Proc of Int Conf on Theory of Cryptography. Berlin: Springer, 2010: 419436[4]William K. Moses Jr, Rangan C P. Rational secret sharing with honest players over an asynchronous channel[C] Proc of Int Conf on Network Security and Applications. Berlin: Springer, 2011: 414426[5]杨怡. 理性门限签名的若干关键技术研究[D]. 北京: 北京工业大学, 2012[6]Zhang Z F, Liu M L. Rational secret sharing as extensive games[J]. Science China Information Sciences, 2013, 56(3): 113[7]刘栋琦, 贺亚威, 侯整风. 一种公平的理性秘密共享方案[J]. 计算机应用与软件, 2015, 32(8): 276278[8]刘海, 李兴华, 马建峰. 基于重构顺序调整机制的理性秘密共享方案[J]. 计算机研究与发展, 2015, 52(10): 23322340[9]张利远, 张恩. 基于中国剩余定理的可验证理性秘密共享方案[J]. 计算机应用, 2012, 32(11): 31433146[10]Tian Y L, Peng C G, Lin D D, et al. Bayesian mechanism for rational secret sharing scheme[J]. Science China Information Sciences, 2015, 58(5): 113[11]彭长根, 刘 海, 田有亮, 等. 混合偏好模型下的分布式理性秘密共享方案[J].计算机研究与发展, 2014, 51(7): 14761485[12]李梦慧, 田有亮, 冯金明. 常数轮公平理性秘密共享方案[J]. 网络与信息安全学报, 2017, 3(1): 6167[13]De S J, Ruj S. Failure tolerant rational secret sharing[C] Proc of IEEE Int Conf on Advanced Information Networking and Applications. Piscataway, NJ: IEEE, 2016: 925932[14]高若愚. 异步环境下的理性秘密分享方案[D]. 南京: 南京航空航天大学, 2014[15]Dodis Y. Efficient construction of (distributed) verifiable random functions[G] LNCS 2567: Public Key Cryptography—PKC 2003. Berlin: Springer, 2003: 117[16]Dodis Y, Yampolskiy A. A verifiable random function with short proofs and keys[C] Proc of PKC 2005. Berlin: Springer, 2005: 416431
|