“…Halpern and Teague [8] first studied the rational behavior of participants for secret sharing. Since then, rational secret sharing has been intensively studied [9], [10], [11], [12], [13], [14], [15]. Moreover, there have been many studies using game-theoretic analysis of cryptographic primitives/protocols, including two-party computation [16], [17], leader election [18], [19], Byzantine agreement [20], consensus [21], public-key encryption [22], [23], delegation of computation [24], [25], [26], [27], [28], [29], and protocol design [30], [31].…”