ABSTRACT
We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of size up to k can do better, even if the whole coalition defects. We show that such k-resilient Nash equilibria exist for secret sharing and multiparty computation, provided that players prefer to get the information than not to get it. Our results hold even if there are only 2 players, so we can do multiparty computation with only two rational agents. We extend our results so that they hold even in the presence of up to t players with "unexpected" utilities. Finally, we show that our techniques can be used to simulate games with mediators by games without mediators.
- E. Adar and B. Huberman. Free riding on Gnutella. First Monday, 5(10), 2000.Google Scholar
- R Aumann. Acceptable points in general cooperative n-person games. Contributions to the Theory of Games, Annals of Mathematical Studies, IV:287--324, 1959.Google Scholar
- M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM Symp. Theory of Computing, pages 1--10, 1988. Google ScholarDigital Library
- E. Ben-Porath. Cheap talk in games with incomplete information. J. Economic Theory, 108(1):45--71, 2003.Google ScholarCross Ref
- B. D. Bernheim, B. Peleg, and M. Whinston. Coalition proof Nash equilibrium: Concepts. J. Economic Theory, 42(1):1--12, 1989.Google ScholarCross Ref
- F. M. Forges. An approach to communication equilibria. Econometrica, 54(6):1375--85, 1986.Google ScholarCross Ref
- O. Goldreich. Foundations of Cryptography, Vol. 2. Cambridge University Press, 2004. Google ScholarDigital Library
- O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proc. 19th ACM Symp. Theory of Computing, pages 218--229, 1987. Google ScholarDigital Library
- D. Gordon and J. Katz. Rational secret sharing, revisited. Unpublished manuscript, 2006.Google Scholar
- J. Y. Halpern and V. Teague. Rational secret sharing and multiparty computation: extended abstract. In Proc. 36th ACM Symp. Theory of Computing, pages 623--632, 2004. Google ScholarDigital Library
- Yuval Heller. A minority-proof cheap-talk protocol. Unpublished manuscript, 2005.Google Scholar
- S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In Proc. 46th IEEE Symp. Foundations of Computer Science, pages 585--595, 2005. Google ScholarDigital Library
- J. Justesen. On the complexity of decoding Reed-Solomon codes (corresp). IEEE Trans. on Information Theory, 22(2):237--238, 1976.Google ScholarDigital Library
- L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals problem. ACM Trans. on Programming Languages and Systems, 4(3):382--401, 1982. Google ScholarDigital Library
- M. Lepinksi, S. Micali, and A. Shelat. Collusion-free protocols. In Proc. 37th ACM Symp. Theory of Computing, pages 543--552, 2005. Google ScholarDigital Library
- M. Lepinski, S. Micali, C. Peikert, and A. Shelat. Completely fair SFE and coalition-safe cheap talk. In Proc. 23rd ACM Symp. Principles of Distributed Computing, pages 1--10, 2004. Google ScholarDigital Library
- A. Lysyanskaya and N. Triandopoulos. Rationality and adversarial behavior in multi-party computation. Unpublished manuscript, 2006.Google Scholar
- D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - secure two-party computation system. In Proc. 13th USENIX Security Symposium, pages 287--302, 2004. Google ScholarDigital Library
- D. Moreno and J. Wooders. Coalition-proof equilibrium. Games and Economic Behavior, 17(1):80--112, 1996.Google ScholarCross Ref
- G. Neiger and S. Toueg. Automatically increasing the fault-tolerance of distributed algorithms. Journal of Algorithms, 11(3):374--419, 1990. Google ScholarDigital Library
- M. J. Osborne and A. Rubinstein. A Course in Game Theory. MIT Press, Cambridge, Mass., 1994.Google Scholar
- T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st ACM Symp. Theory of Computing, pages 73--85, 1989. Google ScholarDigital Library
- A. Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979. Google ScholarDigital Library
- Y. Shoham and M. Tennenholtz. Non-cooperative computing: Boolean functions with correctness and exclusivity. Theoretical Computer Science, 343(1--2):97--113, 2005. Google ScholarDigital Library
- A. Yao. Protocols for secure computation (extended abstract). In Proc. 23rd IEEE Symp. Foundations of Computer Science, pages 160--164, 1982.Google ScholarDigital Library
Index Terms
- Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation
Recommendations
Discovering theorems in game theory: Two-person games with unique pure Nash equilibrium payoffs
In this paper we provide a logical framework for two-person finite games in strategic form, and use it to design a computer program for discovering some classes of games that have unique pure Nash equilibrium payoffs. The classes of games that we ...
Unconditionally secure disjointness tests for private datasets
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals ...
Pricing strategy of ecological industry chain based on game theory
The pricing decision of three stages ecological industry chain of which is consisted of manufacturer producing mainproduct and byproduct, mainproduct seller and byproduct buyer is studied. Four kinds of pricing decision were discussed: manufacturer ...
Comments