Rational secure computation and ideal mechanism design

被引:61
作者
Izmalkov, S [1 ]
Micali, S [1 ]
Lepinski, M [1 ]
机构
[1] MIT, Dept Econ, Cambridge, MA 02139 USA
来源
46th Annual IEEE Symposium on Foundations of Computer Science, Proceedings | 2005年
关键词
D O I
10.1109/SFCS.2005.64
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Secure Computation essentially guarantees that whatever computation n players can do with the help of a trusted party, they can also do by themselves. Fundamentally, however, this notion depends on the honesty of at least some players. We put forward and implement a stronger notion, Rational Secure Computation, that does not depend on player honesty, but solely on player rationality. The key to our implementation is showing that the ballot-box-the venerable device used throughout the world to tally secret votes securely-can actually be used to securely compute any function. Our work bridges the fields of Game Theory and Cryptography, and has broad implications for Mechanism Design.
引用
收藏
页码:585 / 594
页数:10
相关论文
共 17 条
[1]  
BARRINGTON DA, 1986, P STOC 86 ACM
[2]  
BRANDT F, 2004, P 3 AAMAS ACM
[3]  
CANETTI R, 2001, P 42 FOCS
[4]  
DODIS Y, 2000, CRYTPO 00
[5]  
Fudenberg D., 1991, GAME THEORY
[6]  
GOLDREICH O, 1987, P STOC 87 ACM
[7]  
Goldwasser S., 1984, J COMPUTER SYSTEM SC, V28
[8]  
HALPERN J, 2004, P 36 STOC
[9]  
Jackson M. O., 2003, OPTIMIZATION OPERATI
[10]   BAYESIAN IMPLEMENTATION [J].
JACKSON, MO .
ECONOMETRICA, 1991, 59 (02) :461-477