STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Fair distribution protocols or how the players replace fortune
Mathematics of Operations Research
Privacy preserving auctions and mechanism design
Proceedings of the 1st ACM conference on Electronic commerce
Completely fair SFE and coalition-safe cheap talk
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
(Im)Possibility of Unconditionally Privacy-Preserving Auctions
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
Rational Secure Computation and Ideal Mechanism Design
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Intermediated Blind Portfolio Auctions
Management Science
Hi-index | 0.00 |
Privacy and trust affect our everyday thinking and, in particular, the way we approach a concrete game. Accordingly, we hope that a rigorous treatment of privacy and trust will become integral part of mechanism design. As of now, the field has been very successful in finding many ingenious mechanisms as solutions to a variety of problems. But these mechanisms are theoretical constructions and not enough attention has been devoted to their concrete implementation. Indeed, It should be appreciated that the outcome function of a simple normal-form mechanism does not spontaneously evaluate itself on the "messages" that the players have selected in "their own minds." To be practically useful in a real strategic setting, any mechanism M, whether of normal or extensive form, must be concretely implemented. But then, in such concrete implementations, issues of privacy and trust may arise so as to undermine the valuable theoretical properties of M.