Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-78524-8_17
|View full text |Cite
|
Sign up to set email alerts
|

Lower Bounds on Implementing Robust and Resilient Mediators

Abstract: Abstract. We provide new and tight lower bounds on the ability of players to implement equilibria using cheap talk, that is, just allowing communication among the players. One of our main results is that, in general, it is impossible to implement three-player Nash equilibria in a bounded number of rounds. We also give the first rigorous connection between Byzantine agreement lower bounds and lower bounds on implementation. To this end we consider a number of variants of Byzantine agreement and introduce reduct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
0

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(93 citation statements)
references
References 52 publications
0
93
0
Order By: Relevance
“…We conclude by showing that the prescribed strategy ⃗ σ is not a computational Nash equilibrium by showing that one of the ⃗ σ stop strategies has a better expected utility than ⃗ σ. That is, we show that either u 2 …”
Section: Intuitionmentioning
confidence: 62%
See 2 more Smart Citations
“…We conclude by showing that the prescribed strategy ⃗ σ is not a computational Nash equilibrium by showing that one of the ⃗ σ stop strategies has a better expected utility than ⃗ σ. That is, we show that either u 2 …”
Section: Intuitionmentioning
confidence: 62%
“…The basic question that we ask regarding utility independence was proposed in [7]. The first partial answer to this question was given by [1] (with extension in [2]) who showed that utility independence is possible for t-out-of-n secret sharing as long as t < n/3. This question was also considered by [16] who showed that utility independence can be achieved if the number of parties participating in the reconstruction procedure is strictly greater than the threshold t. The works of [15,13] can be used to obtain fair secret sharing, but assume stronger physical assumptions than a simultaneous channel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(See for instance [6], [7], and [8].) It is interesting to explore how these extensions of Nash equilibrium can impact our theory of Perturbation-Freedom outlined in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…(2) If no player deviates during the multiparty computation, then at the end of the monitoring subphase, all non-deviating players commonly agree: (i) that no deviation occurred, and (ii) on the values of the inputs and outputs of all the players.…”
Section: Secure Multiparty Computationsmentioning
confidence: 99%