Abstract:The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by … Show more
“…For one thing, work has continued on secret sharing and multiparty computation, taking faulty and rational behavior into account (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Dani, Movahedi, Rodriguez, and Saia 2011;Fuchsbauer, Katz, and Naccache 2010;Gordon and Katz 2006;Lysyanskaya and Triandopoulos 2006]). There has also been work on when and whether a problem that can be solved with a trusted third party can be converted to one that can be solved using cheap talk, without a third party, a problem that has also attracted the attention of game theorists (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Abraham, Dolev, and Halpern 2008;Barany 1992;Ben-Porath 2003;Dodis, Halevi, and Rabin 2000;Forges 1990;Heller 2005;Izmalkov, Lepinski, and Micali 2011;Lepinski, Micali, Peikert, and Shelat 2004;McGrew, Porter, and Shoham 2003;Shoham and Tennenholtz 2005;Urbano and Vila 2002;Urbano and Vila 2004]). This is relevant because there are a number of well-known distributed computing problems that can be solved easily by means of a "trusted" mediator.…”
We do a game-theoretic analysis of leader election, under the assumption that each agent prefers to have some leader than to have no leader at all. We show that it is possible to obtain a fair Nash equilibrium, where each agent has an equal probability of being elected leader, in a completely connected network, in a bidirectional ring, and a unidirectional ring, in the synchronous setting. In the asynchronous setting, Nash equilibrium is not quite the right solution concept. Rather, we must consider ex post Nash equilibrium; this means that we have a Nash equilibrium no matter what a scheduling adversary does. We show that ex post Nash equilibrium is attainable in the asynchronous setting in all the networks we consider, using a protocol with bounded running time. However, in the asynchronous setting, we require that n > 2. We can get a fair -Nash equilibrium if n = 2 in the asynchronous setting, under some cryptographic assumptions (specifically, the existence of a pseudo-random number generator and polynomially-bounded agents), using ideas from bit-commitment protocols. We then generalize these results to a setting where we can have deviations by a coalition of size k. In this case, we can get what we call a fair k-resilient equilibrium if n > 2k; under the same cryptographic assumptions, we can a get a k-resilient equilibrium if n = 2k. Finally, we show that, under minimal assumptions, not only do our protocols give a Nash equilibrium, they also give a sequential equilibrium [Kreps and Wilson 1982], so players even play optimally off the equilibrium path.
“…For one thing, work has continued on secret sharing and multiparty computation, taking faulty and rational behavior into account (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Dani, Movahedi, Rodriguez, and Saia 2011;Fuchsbauer, Katz, and Naccache 2010;Gordon and Katz 2006;Lysyanskaya and Triandopoulos 2006]). There has also been work on when and whether a problem that can be solved with a trusted third party can be converted to one that can be solved using cheap talk, without a third party, a problem that has also attracted the attention of game theorists (e.g., [Abraham, Dolev, Gonen, and Halpern 2006;Abraham, Dolev, and Halpern 2008;Barany 1992;Ben-Porath 2003;Dodis, Halevi, and Rabin 2000;Forges 1990;Heller 2005;Izmalkov, Lepinski, and Micali 2011;Lepinski, Micali, Peikert, and Shelat 2004;McGrew, Porter, and Shoham 2003;Shoham and Tennenholtz 2005;Urbano and Vila 2002;Urbano and Vila 2004]). This is relevant because there are a number of well-known distributed computing problems that can be solved easily by means of a "trusted" mediator.…”
We do a game-theoretic analysis of leader election, under the assumption that each agent prefers to have some leader than to have no leader at all. We show that it is possible to obtain a fair Nash equilibrium, where each agent has an equal probability of being elected leader, in a completely connected network, in a bidirectional ring, and a unidirectional ring, in the synchronous setting. In the asynchronous setting, Nash equilibrium is not quite the right solution concept. Rather, we must consider ex post Nash equilibrium; this means that we have a Nash equilibrium no matter what a scheduling adversary does. We show that ex post Nash equilibrium is attainable in the asynchronous setting in all the networks we consider, using a protocol with bounded running time. However, in the asynchronous setting, we require that n > 2. We can get a fair -Nash equilibrium if n = 2 in the asynchronous setting, under some cryptographic assumptions (specifically, the existence of a pseudo-random number generator and polynomially-bounded agents), using ideas from bit-commitment protocols. We then generalize these results to a setting where we can have deviations by a coalition of size k. In this case, we can get what we call a fair k-resilient equilibrium if n > 2k; under the same cryptographic assumptions, we can a get a k-resilient equilibrium if n = 2k. Finally, we show that, under minimal assumptions, not only do our protocols give a Nash equilibrium, they also give a sequential equilibrium [Kreps and Wilson 1982], so players even play optimally off the equilibrium path.
“…Starting with Forges (1990) and Bárány (1992), a body of literature, including Urbano and Vila (2002), Ben-Porath (2003), and Gerardi (2004), studies models of decentralized communication. An important conclusion of this literature is that-under various assumptions-all communication equilibria can be implemented through preplay decentralized communication procedures.…”
We study a repeated game with asymmetric information about a dynamic state of nature. In the course of the game, the better-informed player can communicate some or all of his information to the other. Our model covers costly and/or bounded communication. We characterize the set of equilibrium payoffs and contrast these with the communication equilibrium payoffs, which by definition entail no communication costs.
“…At the same time, another line of research has shown applicative and theoretical results for cooperative services for what is known as the BAR model (Byzantine, acquiescent [33] and rational) [5,26,33] . Another related line of research asks whether a problem that can be solved with a mediator can be converted to a cheap talk based solution [2,3,6,7,9,11,21,22,24,29,30,31]. This approach is very strong because there are many results that are based on a mediator, which other players cannot trust under the rationality assumption, if we can convert mediator based protocols to be based on cheap talk, many of the previous works that do not assume rationality may become relevant under this assumption.…”
Following [4] we extend and generalize the game-theoretic model of distributed computing, identifying different utility functions that encompass different potential preferences of players in a distributed system. A good distributed algorithm in the game-theoretic context is one that prohibits the agents (processors with interests) from deviating from the protocol; any deviation would result in the agent losing, i.e., reducing its utility at the end of the algorithm. We distinguish between different utility functions in the context of distributed algorithms, e.g., utilities based on communication preference, solution preference, and output preference. Given these preferences we construct two basic building blocks for game theoretic distributed algorithms, a wake-up building block resilient to any preference and in particular to the communication preference (to which previous wake-up solutions were not resilient), and a knowledge sharing building block that is resilient to any and in particular to solution and output preferences. Using the building blocks we present several new algorithms for consensus, and renaming as well as a modular presentation of the leader election algorithm of [4].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.