Now showing items 1-4 of 4

    • Rational Secure Computation: New Definitions and Constructions 

      Agarwal, Siddharth
      Cryptography and Game Theory are two fascinating areas of modern computing, and there have been numerous works since the early 2000s to bridge these. While cryptography provides mechanisms to detect deviations, game theory ...
    • Secure Auctions with Rational Parties 

      Shankar, Girisha
      Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of ...
    • Zero Knowledge Proofs: Succinct Verification, Distributed Proofs and Lookup Arguments 

      Dutta, Moumita
      Zero-Knowledge Proofs (ZKPs) are fundamental cryptographic tools enabling a prover to convince a verifier about the knowledge of a secret witness related to a public statement, without revealing any information beyond the ...
    • Zero-Knowledge Proofs with Enhanced Deniability 

      Sur, Suvankar
      In cryptography, deniability is a crucial concept that allows a participant to plausibly deny taking part in executing a scheme or protocol. Non-interactive zero-knowledge (NIZK) proofs enable a party (the prover) to ...