Tik-110.553
Methods of Cryptography: "Interplay between Cryptography and Game Theory"
Lecturer: Helger Lipmaa
General Information
Lectures
- Feb 7. Lecture 1. Introduction. Covered: introduction to game theory
and
interplay between two areas. (Helger Lipmaa) [slides: pdf (46K)]
- Feb 14. Lecture 2. Analysis of the [Dodis, Halevi, Rabin] paper. What
is their
goal and how is cryptography used to solve it? (Helger
Lipmaa) [slides: pdf (71K)]
- Feb 21. Lecture 3. Auctions: game theory and cryptography, based on
the papers by
Varin and [Naor, Pinkas, Sumner] (Mika Kojo)
[slides: pdf (56K)]
- Feb 28. Lecture 4. More serious introduction to game theory, based on
two first
chapters of [Osborne, Rubinstein] (Silja Mäki) [slides: ps.gz
(36K)]
- Mar 7, 14, 21. No lectures. Independent homereading of
[Osborne, Rubinstein]
- Mar 28. Lecture 5. Presentations by Matthias Fischmann and Johan
Wallén.
- The Core. (Johan Wallén) [slides: pdf
(41K)]
- Apr 4. No lectures.
- Apr 11. Implementation theory. (Johan Wallén) slides: pdf (98K)]
- Apr 18.
- Apr 25. Presentation by Mika Kojo.
- May 2. No lectures
- May 22. Overview of the paper "Repetated Games Played by
Cryptographically Sophisticated Players" by Olivier Gossner.
Presentation by Silja Mäki. slides: pdf
And this is all...
Home reading
- Textbook about game theory: Martin J. Osborne, Ariel Rubinstein, ``A Course in Game
Theory'', The MIT Press, 1994. (I have a copy of the sixth
printing, 1999)
- Yevgeniy Dodis,
Shaih Halevi and
Tal Rabin,
"A Cryptographic Solution to a Game Theoretic Problem" ,
CRYPTO 2000.
[Abstract]
- Moni Naor,
Benny Pinkas,
Reuben Sumner,
"Privacy
Preserving Auctions and Mechanism Design", 1999.
- Hal R. Varin,
Mechanism
Design for Computerized Agents
Links:
This page is maintained by Helger Lipmaa.
The
contents of this page has last been updated 27.02.2001.
URL:
http://research.cyber.ee/~lipmaa/teaching/crypto-gametheory/