Utility Dependence in Correct and Fair Rational Secret Sharing

被引:33
作者
Asharov, Gilad [1 ]
Lindell, Yehuda [1 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
基金
以色列科学基金会;
关键词
Rational secret sharing; Game theory and cryptography; MULTIPARTY COMPUTATION; GAME-THEORY; CRYPTOGRAPHY;
D O I
10.1007/s00145-010-9064-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that has been studied considerably is that of rational secret sharing. In this setting, the aim is to construct a mechanism (protocol) so that parties behaving rationally have incentive to cooperate and provide their shares in the reconstruction phase, even if each party prefers to be the only one to learn the secret. Although this question was only recently asked by Halpern and Teague (STOC 2004), a number of works with beautiful ideas have been presented to solve this problem. However, they all have the property that the protocols constructed need to know the actual utility values of the parties (or at least a bound on them). This assumption is very problematic because the utilities of parties are not public knowledge. We ask whether this dependence on the actual utility values is really necessary and prove that in the case of two parties, rational secret sharing cannot be achieved without it. On the positive side, we show that in the multiparty case it is possible to construct a single mechanism that works for all (polynomial) utility functions. Our protocol has an expected number of rounds that is constant, and is optimally resilient to coalitions. In addition to the above, we observe that the known protocols for rational secret sharing that do not assume simultaneous channels all suffer from the problem that one of the parties can cause the others to output an incorrect value. (This problem arises when a party gains higher utility by having another output an incorrect value than by learning the secret itself; we argue that such a scenario needs to be considered.) We show that this problem is inherent in the non-simultaneous channels model, unless the actual values of the parties' utilities from this attack are known, in which case it is possible to prevent this from happening.
引用
收藏
页码:157 / 202
页数:46
相关论文
共 18 条
[1]  
Abraham I, 2008, LECT NOTES COMPUT SC, V4948, P302, DOI 10.1007/978-3-540-78524-8_17
[2]   COALITION-PROOF NASH EQUILIBRIA .1. CONCEPTS [J].
BERNHEIM, BD ;
PELEG, B ;
WHINSTON, MD .
JOURNAL OF ECONOMIC THEORY, 1987, 42 (01) :1-12
[3]  
Cleve R., 1986, P 18 ANN ACM S THEOR, P364, DOI DOI 10.1145/12130.12168
[4]  
Dodis Y, 2007, ALGORITHMIC GAME THEORY, P181
[5]  
FUCHSBAUER G, 2008, 2008488 CRYPT EPRINT
[6]  
Gordon SD, 2006, LECT NOTES COMPUT SC, V4116, P229
[7]  
Halpern J., 2004, P 36 ANN ACM S THEOR, P623
[8]  
Ittai Abraham, 2006, P 25 ANN ACM S PRINC, P188, DOI [DOI 10.1145/1146381.1146411, 10.1145/1146381.1146393, 10.1145/1146381.1146411.8,31, DOI 10.1145/1146381.1146411.8,31]
[9]   Rational secure computation and ideal mechanism design [J].
Izmalkov, S ;
Micali, S ;
Lepinski, M .
46th Annual IEEE Symposium on Foundations of Computer Science, Proceedings, 2005, :585-594
[10]  
Katz J, 2003, LECT NOTES COMPUT SC, V2656, P578