2018
DOI: 10.1007/978-3-030-03251-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Incentives in Security Protocols

Abstract: Real world protocols often involve human choices that depend on incentives, including when they fail and require fail-safe or fail-deadly mechanisms. We look at three example systems (the EMV protocol, consensus in cryptocurrencies, and Tor) in this context, paying particular attention to the role that incentives play in fail-safe and faildeadly situations. We argue that incentives should explicitly be taken into account in the design of security protocols, and discuss general challenges in doing so.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…Professional organizations, services providers, and regulatory authorities must collaborate to form a comprehensive and standardized DLT security approach. Azouvi et al [97] emphasize that incentive systems play an essential role for the security guard in order to enhance system security. DLT could also provide traceability to the access of information.…”
Section: Evaluation Framework For a Dlt-based Eu Etsmentioning
confidence: 99%
“…Professional organizations, services providers, and regulatory authorities must collaborate to form a comprehensive and standardized DLT security approach. Azouvi et al [97] emphasize that incentive systems play an essential role for the security guard in order to enhance system security. DLT could also provide traceability to the access of information.…”
Section: Evaluation Framework For a Dlt-based Eu Etsmentioning
confidence: 99%
“…The application of Nash equilibrium as a stability concept in blockchains is not uncontroversial [11], [94]. In particular, [94] and [56] argue that the shortcomings of Nash equilibria in distributed computational systems involve the following dimensions: unexpected behavior (irrational players with outof-system incentives), coalitional deviations, computational limitations (resource-bounded players) and too much uncertainty or a lack of information (players are unaware of all the aspects of the game).…”
Section: A Alternative Equilibrium Conceptsmentioning
confidence: 99%
“…Despite its theoretical appeal, [94] observes that the concept of (k, t)-robust equlibrium has its own limitations and points to concepts of computational equilibria and particularly to the BAR-model -model with Byzantine, Altruistic and Rational agents -as possible alternatives [3], [11]. Nevertheless, [92] provide strong arguments to support the use of Nash equilibrium by showing that large games are inately fault tolerant.…”
Section: A Alternative Equilibrium Conceptsmentioning
confidence: 99%
“…A recent revision of S&S principles in 2012 by Smith [9, p. 24] casted this authentic interpretation by renaming the 'Fail-safe default' principle as 'Deny by default' . This notion of fail-safe has been used from classical security protocols [2] to modern incentives for distributed computations [7]. It is also well understood in access control [8] and software design [4].…”
Section: Fail-safe For Information Usementioning
confidence: 99%