skip to main content
10.1145/1146381.1146393acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation

Published:23 July 2006Publication History

ABSTRACT

We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of size up to k can do better, even if the whole coalition defects. We show that such k-resilient Nash equilibria exist for secret sharing and multiparty computation, provided that players prefer to get the information than not to get it. Our results hold even if there are only 2 players, so we can do multiparty computation with only two rational agents. We extend our results so that they hold even in the presence of up to t players with "unexpected" utilities. Finally, we show that our techniques can be used to simulate games with mediators by games without mediators.

References

  1. E. Adar and B. Huberman. Free riding on Gnutella. First Monday, 5(10), 2000.Google ScholarGoogle Scholar
  2. R Aumann. Acceptable points in general cooperative n-person games. Contributions to the Theory of Games, Annals of Mathematical Studies, IV:287--324, 1959.Google ScholarGoogle Scholar
  3. M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. 20th ACM Symp. Theory of Computing, pages 1--10, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Ben-Porath. Cheap talk in games with incomplete information. J. Economic Theory, 108(1):45--71, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  5. B. D. Bernheim, B. Peleg, and M. Whinston. Coalition proof Nash equilibrium: Concepts. J. Economic Theory, 42(1):1--12, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  6. F. M. Forges. An approach to communication equilibria. Econometrica, 54(6):1375--85, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  7. O. Goldreich. Foundations of Cryptography, Vol. 2. Cambridge University Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proc. 19th ACM Symp. Theory of Computing, pages 218--229, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Gordon and J. Katz. Rational secret sharing, revisited. Unpublished manuscript, 2006.Google ScholarGoogle Scholar
  10. J. Y. Halpern and V. Teague. Rational secret sharing and multiparty computation: extended abstract. In Proc. 36th ACM Symp. Theory of Computing, pages 623--632, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yuval Heller. A minority-proof cheap-talk protocol. Unpublished manuscript, 2005.Google ScholarGoogle Scholar
  12. S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In Proc. 46th IEEE Symp. Foundations of Computer Science, pages 585--595, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Justesen. On the complexity of decoding Reed-Solomon codes (corresp). IEEE Trans. on Information Theory, 22(2):237--238, 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals problem. ACM Trans. on Programming Languages and Systems, 4(3):382--401, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Lepinksi, S. Micali, and A. Shelat. Collusion-free protocols. In Proc. 37th ACM Symp. Theory of Computing, pages 543--552, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Lepinski, S. Micali, C. Peikert, and A. Shelat. Completely fair SFE and coalition-safe cheap talk. In Proc. 23rd ACM Symp. Principles of Distributed Computing, pages 1--10, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Lysyanskaya and N. Triandopoulos. Rationality and adversarial behavior in multi-party computation. Unpublished manuscript, 2006.Google ScholarGoogle Scholar
  18. D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - secure two-party computation system. In Proc. 13th USENIX Security Symposium, pages 287--302, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Moreno and J. Wooders. Coalition-proof equilibrium. Games and Economic Behavior, 17(1):80--112, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  20. G. Neiger and S. Toueg. Automatically increasing the fault-tolerance of distributed algorithms. Journal of Algorithms, 11(3):374--419, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. J. Osborne and A. Rubinstein. A Course in Game Theory. MIT Press, Cambridge, Mass., 1994.Google ScholarGoogle Scholar
  22. T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st ACM Symp. Theory of Computing, pages 73--85, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Shamir. How to share a secret. Commun. ACM, 22(11):612--613, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y. Shoham and M. Tennenholtz. Non-cooperative computing: Boolean functions with correctness and exclusivity. Theoretical Computer Science, 343(1--2):97--113, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Yao. Protocols for secure computation (extended abstract). In Proc. 23rd IEEE Symp. Foundations of Computer Science, pages 160--164, 1982.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      PODC '06: Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
      July 2006
      230 pages
      ISBN:1595933840
      DOI:10.1145/1146381

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 July 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate740of2,477submissions,30%

      Upcoming Conference

      PODC '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader