2017
DOI: 10.1587/transfun.e100.a.2392
|View full text |Cite
|
Sign up to set email alerts
|

Rational Proofs against Rational Verifiers

Abstract: Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is rational, and may deviate from the protocol for increasing his reward. Guo et al. (ITCS 2014) demonstrated that rational proofs are relevant to delegation of computation. By restricting the prover to be computationally bounded, they presented a one-round delegation scheme with sublinear verification for functions computable by log-space uniform circuits with logarithmic depth. In this work, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Chen et al [18] consider rational proofs where the rational provers are noncooperative [18]. Inasawa and Kenji [36] consider rational proofs where the verifier is also rational and wants to minimize the payment to the provers.…”
Section: Additional Related Workmentioning
confidence: 99%
“…Chen et al [18] consider rational proofs where the rational provers are noncooperative [18]. Inasawa and Kenji [36] consider rational proofs where the verifier is also rational and wants to minimize the payment to the provers.…”
Section: Additional Related Workmentioning
confidence: 99%
“…There are many studies using game-theoretic analysis for cryptographic primitives, including secret sharing [10]- [19], two-party protocols [20]- [22], public-key encryption [9], leader election [23], [24], Byzantine agreement [25], delegation of computation [26]- [30], and protocol design [31], [32]. Among them, repeated games have been introduced only in rational secret sharing [33].…”
Section: Related Workmentioning
confidence: 99%
“…Since then, rational secret sharing has been intensively studied [9], [10], [11], [12], [13], [14], [15]. Moreover, there have been many studies using game-theoretic analysis of cryptographic primitives/protocols, including two-party computation [16], [17], leader election [18], [19], Byzantine agreement [20], consensus [21], public-key encryption [22], [23], delegation of computation [24], [25], [26], [27], [28], [29], and protocol design [30], [31]. Among them, several works [20], [24], [25], [27], [30] used the rationality of adversaries to circumvent the impossibility results.…”
Section: Introductionmentioning
confidence: 99%