tag:blogger.com,1999:blog-25562705.post8995416834336363255..comments2023-10-20T12:34:59.317-04:00Comments on Adventures in Computation: Malice, Anarchy, and RegretAaronhttp://www.blogger.com/profile/09952936358739421126noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-25562705.post-50057882438665988822008-02-22T20:42:00.000-05:002008-02-22T20:42:00.000-05:00I haven't looked into it very much, apart from hav...I haven't looked into it very much, apart from having heard Silvio Micali give a talk on the subject once. This is one of the many things that I should read about when I get the chance... (I see you have a survey article -- I will print it out). Another interesting "crypto"/game theory connection is the McSherry/Talwar FOCS 07 paper which points out that "differential privacy" and "incentive compatibility" are very closely related concepts.Aaronhttps://www.blogger.com/profile/09952936358739421126noreply@blogger.comtag:blogger.com,1999:blog-25562705.post-62669143412444293972008-02-22T13:05:00.000-05:002008-02-22T13:05:00.000-05:00Have you looked at any of the work combining game ...Have you looked at any of the work combining game theory and cryptography? Since malicious players are dealt with in the crypto scenario as well, it seems like there may be some overlapJonathan Katzhttps://www.blogger.com/profile/07362776979218585818noreply@blogger.com