2011
DOI: 10.1007/978-3-642-20465-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Game Theoretic View of Secure Computation

Abstract: Abstract. We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security. In the restricted but indicative case of two-party protocols in the face of malicious fail-stop faults, we first show how the traditional notions of secrecy and correctness of protocols can be captured as properties of Nash equilibria in games for rational players. Next, we concentrate on fairness. Here we demonstrate a Game Theoretic notion and two different cryptographic notions that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
68
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(68 citation statements)
references
References 31 publications
(35 reference statements)
0
68
0
Order By: Relevance
“…Much study has been devoted to rational secret sharing [20,1,14,24,25,27,28,3]. There are studies on other cryptographic primitives such as fair two-party computation [2,16], leader election [15], byzantine agreement [17], oblivious transfer [21], and commitment schemes [22]. Our work also can be seen as a study of rational cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Much study has been devoted to rational secret sharing [20,1,14,24,25,27,28,3]. There are studies on other cryptographic primitives such as fair two-party computation [2,16], leader election [15], byzantine agreement [17], oblivious transfer [21], and commitment schemes [22]. Our work also can be seen as a study of rational cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Asharov and Lindell [AL11] initiated a translation of the security of rational secret sharing in terms of cryptographic properties such as correctness and fairness. Following up, Asharov, Canetti, and Hazay [ACH11] provided rational cryptography notions of fair, correct, and private two-party SFE (by defining appropriate utilities for the parties and corresponding protocols) and showed an equivalence between these notions and natural cryptographic counterparts. Their results on fairness were extended in [GK12].…”
Section: A Related Literaturementioning
confidence: 99%
“…For example, traditional notions of fairness in the rational setting [ACH11,GK12] define the utilities of the parties based on whether or not they obtain considerable information on each other's output, e.g., the first bits or the whole output. However, it would be natural to consider a protocol unfair if some party obtains noticeable, i.e., not negligible, information about the output and the other does not.…”
Section: A Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…It can be considered as a special case of secure multiparty computation [1][2][3] which has applications in electronic voting, cloud computing, online auction etc. Recently, significant effort has been given towards bridging the gap between two apparently unrelated domains, namely, cryptography and game theory [2][3][4]. Cryptography deals with the 'worst case' scenario making the protocols secure against malicious behavior of a party.…”
Section: Introductionmentioning
confidence: 99%