Methods of Cryptography: "Interplay between Cryptography and Game Theory"
Lecturer: Helger Lipmaa
- Feb 7. Lecture 1. Introduction. Covered: introduction to game theory
interplay between two areas. (Helger Lipmaa) [slides: pdf (46K)]
- Feb 14. Lecture 2. Analysis of the [Dodis, Halevi, Rabin] paper. What
goal and how is cryptography used to solve it? (Helger
Lipmaa) [slides: pdf (71K)]
- Feb 21. Lecture 3. Auctions: game theory and cryptography, based on
the papers by
Varin and [Naor, Pinkas, Sumner] (Mika Kojo)
[slides: pdf (56K)]
- Feb 28. Lecture 4. More serious introduction to game theory, based on
chapters of [Osborne, Rubinstein] (Silja Mäki) [slides: ps.gz
- Mar 7, 14, 21. No lectures. Independent homereading of
- Mar 28. Lecture 5. Presentations by Matthias Fischmann and Johan
- The Core. (Johan Wallén) [slides: pdf
- Apr 4. No lectures.
- Apr 11. Implementation theory. (Johan Wallén) slides: pdf (98K)]
- Apr 18.
- Apr 25. Presentation by Mika Kojo.
- May 2. No lectures
- May 22. Overview of the paper "Repetated Games Played by
Cryptographically Sophisticated Players" by Olivier Gossner.
Presentation by Silja Mäki. slides: pdf
And this is all...
- Textbook about game theory: Martin J. Osborne, Ariel Rubinstein, ``A Course in Game
Theory'', The MIT Press, 1994. (I have a copy of the sixth
- Yevgeniy Dodis,
Shaih Halevi and
"A Cryptographic Solution to a Game Theoretic Problem" ,
- Moni Naor,
Preserving Auctions and Mechanism Design", 1999.
- Hal R. Varin,
Design for Computerized Agents
This page is maintained by Helger Lipmaa.
contents of this page has last been updated 27.02.2001.