On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games

被引:0
|
作者
Wang, Ye [1 ]
Rane, Shantanu [1 ]
Ishwar, Prakash [2 ]
机构
[1] Mitsubishi Elect Res Labs, Cambridge, MA 02139 USA
[2] Boston Univ, Boston, MA 02215 USA
关键词
game theory; secure sampling; correlated randomness; INFORMATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In game theory, a trusted mediator acting on behalf of the players can enable the attainment of correlated equilibria, which may provide better payoffs than those available from the Nash equilibria alone. We explore the approach of replacing the trusted mediator with an unconditionally secure sampling protocol that jointly generates the players' actions. We characterize the joint distributions that can be securely sampled by malicious players via protocols using errorfree communication. This class of distributions depends on whether players may speak simultaneously ("cheap talk") or must speak in turn ("polite talk"). In applying sampling protocols toward attaining correlated equilibria with rational players, we observe that security against malicious protocols may be much stronger than necessary. We propose the concept of secure sampling by rational players, and show that many more distributions are feasible given certain utility functions. However, the payoffs attainable via secure sampling by malicious players are a dominant subset of the rationally attainable payoffs.
引用
收藏
页码:241 / 244
页数:4
相关论文
共 50 条
  • [1] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [2] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [3] REALIZING SECURE MULTIPARTY COMPUTATION ON INCOMPLETE NETWORKS
    Vaya, Shailesh
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 270 - 277
  • [4] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [5] Realizing correlated equilibrium by secure computation
    Qiu, Lirong
    Sun, Xin
    Zhao, Xishun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 34 : 251 - 254
  • [6] Brief Announcement: Realizing Secure Multiparty Computation on Incomplete Networks
    Vaya, Shailesh
    [J]. PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, : 235 - 236
  • [7] Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy
    Eriguchi, Reo
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 335 - 368
  • [8] Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
    Polychroniadou, Antigoni
    Song, Yifan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 812 - 841
  • [9] Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
    Ben-Sasson, Eli
    Fehr, Serge
    Ostrovsky, Rafail
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 663 - 680
  • [10] Characterization and computation of correlated equilibria in infinite games
    Stein, Noah D.
    Parrilo, Pablo A.
    Ozdaglar, Asurnan
    [J]. PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 5414 - 5419