Sequential Rationality in Cryptographic Protocols

被引:9
|
作者
Gradwohl, Ronen [1 ]
Livne, Noam [2 ]
Rosen, Alon [3 ]
机构
[1] Northwestern Univ, Kellogg Sch Management, Evanston, IL 60208 USA
[2] Weizmann Inst Sci, Dept CS & Appl Math, Rehovot, Israel
[3] IDC Herzliya, Sch Comp Sci, Herzliyya, Israel
关键词
game theory; cryptography;
D O I
10.1109/FOCS.2010.65
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers. We propose a new framework for overcoming these obstacles, and provide the first definitions of computational solution concepts that guarantee sequential rationality. We argue that natural computational variants of subgame perfection are too strong for cryptographic protocols. As an alternative, we introduce a weakening called threat-free Nash equilibrium that is more permissive but still eliminates the undesirable "empty threats" of non-sequential solution concepts. To demonstrate the applicability of our framework, we revisit the problem of implementing a mediator for correlated equilibria (Dodis-Halevi-Rabin, Crypto'00), and propose a variant of their protocol that is sequentially rational for a non-trivial class of correlated equilibria. Our treatment provides a better understanding of the conditions under which mediators in a correlated equilibrium can be replaced by a stable protocol.
引用
收藏
页码:623 / 632
页数:10
相关论文
共 50 条
  • [1] Sequential rationality in cryptographic protocols
    Gradwohl, Ronen
    Livne, Noam
    Rosen, Alon
    [J]. ACM Transactions on Economics and Computation, 2013, 1 (01)
  • [2] Stateless Cryptographic Protocols
    Goyal, Vipul
    Maji, Hemanta K.
    [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 678 - 687
  • [3] Cryptography and cryptographic protocols
    Goldreich, O
    [J]. DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [4] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    [J]. TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [5] Cryptography and cryptographic protocols
    Oded Goldreich
    [J]. Distributed Computing, 2003, 16 : 177 - 199
  • [6] Secure Composition of Cryptographic Protocols
    Goyal, Vipul
    [J]. PROVABLE SECURITY, 2011, 6980 : 2 - 2
  • [7] A bisimulation method for cryptographic protocols
    Abadi, M
    Gordon, AD
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 1998, 1381 : 12 - 26
  • [8] Special Issue on Cryptographic Protocols
    Vogt, Andreas
    [J]. CRYPTOGRAPHY, 2018, 2 (03)
  • [9] Visualization of cryptographic protocols with GRACE
    Cattaneo, G.
    De Santis, A.
    Petrillo, U. Ferraro
    [J]. JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2008, 19 (02): : 258 - 290
  • [10] Collusion analysis of cryptographic protocols
    Low, SH
    Maxemchuk, NF
    [J]. IEEE GLOBECOM 1996 - CONFERENCE RECORD, VOLS 1-3: COMMUNICATIONS: THE KEY TO GLOBAL PROSPERITY, 1996, : 1 - 5