2015 IEEE 56th Annual Symposium on Foundations of Computer Science 2015
DOI: 10.1109/focs.2015.94
|View full text |Cite
|
Sign up to set email alerts
|

On the Cryptographic Hardness of Finding a Nash Equilibrium

Abstract: We prove that finding a Nash equilibrium of a game is hard, assuming the existence of indistinguishability obfuscation and one-way functions with sub-exponential hardness. We do so by showing how these cryptographic primitives give rise to a hard computational problem that lies in the complexity class PPAD, for which finding Nash equilibrium is complete.Previous proposals for basing PPAD-hardness on program obfuscation considered a strong "virtual black-box" notion that is subject to severe limitations and is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
53
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 67 publications
(54 citation statements)
references
References 28 publications
1
53
0
Order By: Relevance
“…Our results extend the recent result of Bitanski et al [12] and Garg et al [26], who constructed distributions of hard instances of End-of-Line based on indistinguishability obfuscation. We establish that similarly to the End-of-Line, under these cryptographic assumptions, there is a distribution of hard instances for End-of-Metered-Line.…”
supporting
confidence: 75%
See 4 more Smart Citations
“…Our results extend the recent result of Bitanski et al [12] and Garg et al [26], who constructed distributions of hard instances of End-of-Line based on indistinguishability obfuscation. We establish that similarly to the End-of-Line, under these cryptographic assumptions, there is a distribution of hard instances for End-of-Metered-Line.…”
supporting
confidence: 75%
“…In particular, they showed hardness of Sink-of-Verifiable-Line under the assumption of existence of one-way permutations and indistinguishability obfuscation both with polynomial security, and furthermore they showed an alternative construction of hard instances of Sink-ofVerifiable-Line assuming compact functional encryption (a special kind of public-key encryption which supports restricted secret keys that enable a key holder to learn a specific function of the encrypted data, but learn nothing else), which is a plausibly weaker cryptographic primitive than indistinguishability obfuscation. Using the reduction to End-of-Line of [2,12] their result implies cryptographic hardness for PPAD.…”
Section: Cryptographic Hardness For End-ofmetered-line Our Cryptograpmentioning
confidence: 99%
See 3 more Smart Citations