Skip to main content
Log in

Bayesian rational exchange

  • Special Issue Paper
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The notion of rational exchange introduced by Syverson (Proceedings of the 11th IEEE Computer Society Foundations Workshop, pp. 2–13, 1998) is a particularly interesting alternative when an efficient scheme for fair exchange is required but the use of a trusted third party is not allowed. A rational exchange protocol cannot provide fairness, but it ensures that rational (i.e., self-interested) parties would have no reason to deviate from the protocol. Buttyán et al. (J. Comput. Security 12(3/4), 551–588, 2004) have recently pointed out how rationality in exchange protocols can be formalized and studied within the framework provided by Game Theory. In particular, Buttyan’s formal model was used to analyze Syverson’s rational exchange protocol. In this paper, we identify a series of drawbacks in Buttyan’s model which make it somewhat restrictive and unrealistic. We propose an extension to the model which enables us to consider different classes of protocol parties (e.g., honest and dishonest parties), as well as modeling attributes such as reputation or any other participant beliefs that could have an effect on the protocol outcome. The resulting new model enables us to reason rational exchange protocols from the point of view of Bayesian rationality, a notion that may be in some scenarios more appropriate than that defined in terms of Nash equilibrium.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: design and implementation. In: Proceedings of 2002 International World Wide Web Conference, pp. 387–395. ACM Press (2002)

  2. Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: Matsumoto, T. (ed.), 4th ACM Conference on Computer and Communications Security, vol. 6, pp. 8–17. ACM Press (1997)

  3. Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 86–99. IEEE Press (1998)

  4. Asokan, N.: Fairness in electronic commerce. Ph.D. Thesis. University of Waterloo (1998)

  5. Bahreman, A., Tygar, J.D.: Certified electronic mail. In: Proceedings of 1994 Symposium on Network and Distributed System Security, pp. 3–19. Internet Society (1994)

  6. Buttyán, L., Hubaux, J.P.: Rational exchange—a formal model based on game theory. In: Proceedings of the 2nd International Workshop on Electronic Commerce (2001)

  7. Buttyán, L., Hubaux, J.P.: A formal analysis of syverson’s rational exchange protocol. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop, pp. 193–205. IEEE Press (2002)

  8. Buttyán L., Hubaux J.P. and Čapkun S. (2004). A formal model of rational exchange and its application to the analysis of syverson’s protocol. J. Comput. Security 12(3/4): 551–588

    Google Scholar 

  9. Even, S., Yacobi, Y.: Relations among public key signature system. Technical Report 175 (1980). Computer Science Department, Technion, Haifa, Israel

  10. Fischer M.J., Lynch N.A. and Paterson M.S. (1985). Impossibility of distributed consensus with one faulty process. J. ACM 32(2): 374–382

    Article  MATH  MathSciNet  Google Scholar 

  11. Fudenberg D. and Tirole J. (1991). Perfect Bayesian equilibrium and sequential equilibrium. J. Econ. Theory 53(2): 236–260

    Article  MATH  MathSciNet  Google Scholar 

  12. Gibbons R. (1992). Game Theory for Applied Economists. Princeton University Press, Princeton

    Google Scholar 

  13. Kremer S., Markowitch O. and Zhou J. (2002). An intensive survey of fair non-repudiation protocols. Comput. Commun. 25(17): 1606–1621

    Article  Google Scholar 

  14. McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: software tools for game theory, Version 0.2006.01.20 (2006). Available online at: http://econweb.tamu.edu/gambit

  15. Pagnia, H., Gärtner, F.C.: On the impossibility of fair exchange without a trusted third party. Darmstadt University of Technology, Department of Computer Science. Technical Report TUD-BS- 1999-02 (1999)

  16. Pagnia H., Vogt H. and Gärtner F.C. (2003). Fair exchange. Comput. J. 46(1): 55–75

    Article  MATH  Google Scholar 

  17. Syverson, P.: Weakly secret bit commitment: applications to lotteries and fair exchange. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop, pp. 2–13. IEEE Press (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan M. Estevez-Tapiador.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Estevez-Tapiador, J.M., Alcaide, A., Hernandez-Castro, J.C. et al. Bayesian rational exchange. Int. J. Inf. Secur. 7, 85–100 (2008). https://doi.org/10.1007/s10207-007-0039-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-007-0039-5

Keywords

Navigation