An incentive-compatible rational secret sharing scheme using blockchain and smart contract

被引:24
作者
Chen, Zerui [1 ]
Tian, Youliang [1 ,2 ]
Peng, Changgen [1 ,2 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Date, Guiyang 550025, Peoples R China
[2] Guizhou Univ, Inst Cryptog & Data Secur, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
rational secret sharing; game theory; sequential equilibrium; incentive-compatible; smart contract;
D O I
10.1007/s11432-019-2858-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the rational cryptographic protocol, the two rational players often fall into the prisoner's dilemma, which is also the case for the rational secret sharing we consider in this paper. First, it is proved that rational secret sharing has a sequential equilibrium in the natural state, so that rational participants will fall into the prisoner's dilemma, resulting in no participants being able to reconstruct the secret correctly. Next, to solve this problem, we propose an incentive-compatible rational secret scheme. Specifically, the game tree with imperfect information is constructed to facilitate our analysis and proof, and the strictly dominated strategies are directly eliminated to simplify the game tree. Further more, we describe the motivation of the verifier. Then, we prove that rational players have no motivation to deviate from honest behavior using sequential equilibrium so that rational players can reconstruct the secret correctly. Finally, we complete the simulation using the smart contract and analyze our entire scheme. In addition, the game of our scheme does not need to be repeated multiple times to reach sequential equilibrium, i.e., the game always follows the rational path.
引用
收藏
页数:21
相关论文
共 27 条
[1]   SHARVOT: secret SHARe-based VOTing on the blockchain [J].
Bartolucci, Silvia ;
Bernat, Pauline ;
Joseph, Daniel .
2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON EMERGING TRENDS IN SOFTWARE ENGINEERING FOR BLOCKCHAIN (WETSEB), 2018, :30-34
[2]  
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[3]  
Dodis Y, 2007, ALGORITHMIC GAME THEORY, P181
[4]   Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [J].
Dong, Changyu ;
Wang, Yilei ;
Aldweesh, Amjad ;
McCorry, Patrick ;
van Moorsel, Aad .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :211-227
[5]  
Fuchsbauer G, 2010, LECT NOTES COMPUT SC, V5978, P419, DOI 10.1007/978-3-642-11799-2_25
[6]  
Fudenberg Drew., 2005, Game Theory
[7]  
Gordon SD, 2006, LECT NOTES COMPUT SC, V4116, P229
[8]  
Halpern J., 2004, P THIRTYSIXTH ANN AC, P623, DOI DOI 10.1145/1007352.1007447
[9]   A Rational Secret Sharing Relying On Reputation [J].
Jin, Jianghao ;
Zhou, Xie ;
Ma, Chuangui ;
Wang, Xu'an .
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, :384-387
[10]  
Katz J, 2008, LECT NOTES COMPUT SC, V4948, P251, DOI 10.1007/978-3-540-78524-8_15