2013 IEEE 54th Annual Symposium on Foundations of Computer Science 2013
DOI: 10.1109/focs.2013.75
|View full text |Cite
|
Sign up to set email alerts
|

Rational Protocol Design: Cryptography against Incentive-Driven Adversaries

Abstract: Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 71 publications
(66 citation statements)
references
References 40 publications
0
66
0
Order By: Relevance
“…Recently Garay et al (2013) considered the incentives of rational parties and discussed how to design rational protocols. They point out that threaten of protocols are modeled into an external individuals-Adversary.…”
Section: Rational Multiple Function Calculation Under the Uc Modelmentioning
confidence: 99%
“…Recently Garay et al (2013) considered the incentives of rational parties and discussed how to design rational protocols. They point out that threaten of protocols are modeled into an external individuals-Adversary.…”
Section: Rational Multiple Function Calculation Under the Uc Modelmentioning
confidence: 99%
“…However, their work has not considered the effects of costs on the corruption. Garay et al introduced an external attacker and transferred a protocol to a two-party game (Garay et al 2013). They also discussed the relationship between the corruption cost and the utilities when the attacker successfully broke privacy.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, game theory has been used in cryptographic research [23,33] to develop a new adversarial model -a rational adversary who is no longer treated as arbitrarily malicious, but who is motivated by some utility function with the sole purpose of maximizing its utility. It is known that under this model protocols can be designed with better efficiency than that of traditional counterparts [25]. As our problem deals with verifiable computation, we are interested in rational proof systems that have been recently studied in [6,7,32].…”
Section: Related Workmentioning
confidence: 99%