Game-theoretic mechanism for cryptographic protocol

被引:0
作者
机构
[1] College of Science, Guizhou University
[2] School of Computer Science and Technology, Xidian University
[3] School of Information, Central University of Finance and Economics
来源
Peng, C. (sci.cgpeng@gzu.edu.cn) | 1600年 / Science Press卷 / 51期
关键词
Game theory; Game tree; Nash equilibrium; Rational secure protocol; Universally composable security;
D O I
10.7544/issn1000-1239.2014.20111375
中图分类号
学科分类号
摘要
Both game theory and secure communication protocols focus on the designing and analyzing mechanisms for parties in a collaborative manner. Yet the two fields developed very different sets of goals and formalisms. This paper studies the secure communication protocol problem in the game-theoretic setting. The goal of this paper is to formulate computation and communication rules of a secure communication protocol based on Nash equilibrium in the game-theoretic framework. We firstly propose a game-theoretic model of secure protocols, including the player set, information set, available action, action sequence, player function, and utility function using the idea from universally composable security. Since our mode combines with the universally composable ideal, secure protocols can be concurrently run within this model. Secondly, the formalized definition of secure protocols is given according to concept of Nash equilibrium. Thirdly, we give an instance of secure protocol under the game-theoretic mechanism. Finally, the analysis shows that our mechanism is effective.
引用
收藏
页码:344 / 352
页数:8
相关论文
共 27 条
  • [1] Anderson R., Moore T., The economics of information security: A survey and open questions, Science, 314, 5799, pp. 610-613, (2006)
  • [2] Halpen J., Teague V., Rational secret sharing and multiparty computation: Extended abstract, Proc of the 36th Annual ACM Symp on Theory of Computing, pp. 623-632, (2004)
  • [3] Gordon S.D., Katz J., Rational secret sharing, revisited, LNCS 4116: Proc of SCN 2006, pp. 229-241, (2006)
  • [4] Abraham I., Dolev D., Gonen R., Et al., Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation, Proc of the 25th Annual ACM Symp on Principles of Distributed Computing, pp. 53-62, (2006)
  • [5] Lysyanskaya A., Triandopoulos N., Rationality and adversarial behaviour in multi-party computation (extended abstract), LNCS 4117: Proc of CRYPTO2006, pp. 180-197, (2006)
  • [6] Maleka S., Amjed S., Pandurangan C., The deterministic protocol for rational secret sharing, Proc of the 26th IEEE Int Parallel and Distributed Processing Symp, pp. 1-7, (2008)
  • [7] Maleka S., Amjed S., Pandu R.C., Rational secret sharing with repeated games, LNCS 4991: Proc of Information Security Practice and Experience, pp. 334-346, (2008)
  • [8] Aaharoy G., Lindell Y., Utility dependence in correct and fair rational secret sharing, Proc of CRYPTO2009, pp. 559-576, (2009)
  • [9] Fischer M., Wright R., An application of game-theoretic techniques to cryptography
  • [10] Dodis Y., Halevi S., Rabin T., A cryptographic solution to a game theoretic problem, Proc of CRYPTO2000, pp. 112-131, (2000)