Rational Protocol Design: Cryptography against Incentive-Driven Adversaries
Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from...
        Saved in:
      
    
          | Published in | Annual Symposium on Foundations of Computer Science pp. 648 - 657 | 
|---|---|
| Main Authors | , , , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.10.2013
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0272-5428 | 
| DOI | 10.1109/FOCS.2013.75 | 
Cover
| Abstract | Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrupting protocol participants; the goal of the protocol designer is to prevent the attacker from succeeding. We lay the theoretical groundwork for a study of cryptographic protocol design in this setting by providing a methodology for defining the problem within the traditional simulation paradigm. Our framework provides ways of reasoning about important cryptographic concepts (e.g., adaptive corruptions or attacks on communication resources) not handled by previous game-theoretic treatments of cryptography. We also prove composition theorems that-for the first time-provide a sound way to design rational protocols assuming "ideal communication resources" (such as broadcast or authenticated channels) and then instantiate these resources using standard cryptographic tools. Finally, we investigate the problem of secure function evaluation in our framework, where the attacker has to pay for each party it corrupts. Our results demonstrate how knowledge of the attacker's incentives can be used to circumvent known impossibility results in this setting. | 
    
|---|---|
| AbstractList | Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrupting protocol participants; the goal of the protocol designer is to prevent the attacker from succeeding. We lay the theoretical groundwork for a study of cryptographic protocol design in this setting by providing a methodology for defining the problem within the traditional simulation paradigm. Our framework provides ways of reasoning about important cryptographic concepts (e.g., adaptive corruptions or attacks on communication resources) not handled by previous game-theoretic treatments of cryptography. We also prove composition theorems that-for the first time-provide a sound way to design rational protocols assuming "ideal communication resources" (such as broadcast or authenticated channels) and then instantiate these resources using standard cryptographic tools. Finally, we investigate the problem of secure function evaluation in our framework, where the attacker has to pay for each party it corrupts. Our results demonstrate how knowledge of the attacker's incentives can be used to circumvent known impossibility results in this setting. | 
    
| Author | Maurer, Ueli Tackmann, Bjorn Katz, Jonathan Garay, Juan Zikas, Vassilis  | 
    
| Author_xml | – sequence: 1 givenname: Juan surname: Garay fullname: Garay, Juan email: garay@research.att.com – sequence: 2 givenname: Jonathan surname: Katz fullname: Katz, Jonathan email: jkatz@cs.umd.edu – sequence: 3 givenname: Ueli surname: Maurer fullname: Maurer, Ueli email: maurer@inf.ethz.ch – sequence: 4 givenname: Bjorn surname: Tackmann fullname: Tackmann, Bjorn email: bjoernt@inf.ethz.ch – sequence: 5 givenname: Vassilis surname: Zikas fullname: Zikas, Vassilis email: vzikas@cs.ucla.edu  | 
    
| BookMark | eNotj81LwzAcQCNMcJu7efPSf6A13229jc7pcDDx4zzS9JcaqUlJwqD__RS9vHd78BZo5rwDhG4ILgjB9d320LwVFBNWlOICreqywqWshSBMlDM0x7SkueC0ukKLGL8w5lhgNkfPrypZ79SQvQSfvPZDtoFoe3efNWEak--DGj-nTPXKupiyndPgkj1Bvgk_dNm6O0GIKliI1-jSqCHC6t9L9LF9eG-e8v3hcdes97mlnKS8baGuiNEUqMZSa87rVhqNdUk72klDlTHAGRFEV1ABgZYYLjqmWgWqE5Qt0e1f1wLAcQz2W4XpKGUlf__PJMtQUQ | 
    
| CODEN | IEEPAD | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IH CBEJK RIE RIO  | 
    
| DOI | 10.1109/FOCS.2013.75 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Mathematics | 
    
| EISBN | 9780769551357 0769551351  | 
    
| EndPage | 657 | 
    
| ExternalDocumentID | 6686201 | 
    
| Genre | orig-research | 
    
| GroupedDBID | -~X 23M 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ACNCT ADZIZ AFFNX AI. ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI OCL RIE RIL RIO RNS VH1  | 
    
| ID | FETCH-LOGICAL-i241t-bbe981fc2e2c06cc449b6fc0c72d2d6f2affe43151c8e8e1eb1f45d3abaead523 | 
    
| IEDL.DBID | RIE | 
    
| ISSN | 0272-5428 | 
    
| IngestDate | Wed Aug 27 03:51:38 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i241t-bbe981fc2e2c06cc449b6fc0c72d2d6f2affe43151c8e8e1eb1f45d3abaead523 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | ieee_primary_6686201 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2013-10 | 
    
| PublicationDateYYYYMMDD | 2013-10-01 | 
    
| PublicationDate_xml | – month: 10 year: 2013 text: 2013-10  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | Annual Symposium on Foundations of Computer Science | 
    
| PublicationTitleAbbrev | SFCS | 
    
| PublicationYear | 2013 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssj0040503 ssib026763816  | 
    
| Score | 1.8227465 | 
    
| Snippet | Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 648 | 
    
| SubjectTerms | Composition Cryptography Game theory Games Privacy Protocols Secure Computation  | 
    
| Title | Rational Protocol Design: Cryptography against Incentive-Driven Adversaries | 
    
| URI | https://ieeexplore.ieee.org/document/6686201 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA5zT_rij038TR98NN2apWnj6-YYylTUwd5Gk1xkCNvYOkH_enNpV0V88K2UFkLuene5ft93hFzGsm3ASE2ZS76Uu5qDqkgpChnWv1YZGyPBeXgvBiN-O47HNXJVcWEAwIPPIMRL_y_fzPUaW2UtgXQGJGttJakouFob32HCfSgpljpFFOaoc-L7Kwlq_bO0Ar3LVv-h-4ygrk6I6MIfQ1V8TunvkuFmNQWU5C1c5yrUn7-EGv-73D3S_GbvBY9VXtonNZgdkJ1hpc-6apC7p7IHiA_mc-cMQc9DOa6D7vJjkZc61kH2mk1d_Ri4KIKoonegvSWGx8DPcV75c3aTjPo3L90BLccq0KlL1zlVCmQaWc2A6bbQmnOJjJ-2TphhRliWWQuurogjnUIKkYvmlsemk6nMuZ07uB6S-mw-gyMSGCaUM6jMuHVZDrh0b4qEaWVUZFKmjkkDt2WyKJQzJuWOnPx9-5Rso1UKqNwZqefLNZy7lJ-rC2_rLzjLrH8 | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0QPKgXP8D4bQ8e3UKXbWm9ggSFolFIuJHu7qwhJkCgmOivd2dbqjEevDVNm2x2pjOz0_feEHLtR3UFKpKUmeRLuak5qPCEoJBg_auF0j4SnONB0B3xh7E_LpGbggsDABZ8Bi5e2n_5ai7X2CqrBUhnQLLWls859zO21sZ7WGA-lRCLnSwOc1Q6sR2WJqr9s7CAvUe1zmPrBWFdDRfxhT_Gqtis0tkj8WY9GZjkzV2nwpWfv6Qa_7vgfVL95u85T0VmOiAlmB2S3bhQaF1VSO857wLig-ncuIPTtmCOW6e1_FikuZK1k7wmU1NBOiaOIK7oHWh7iQHSsZOcV_akXSWjzt2w1aX5YAU6NQk7pUJAFHpaMmCyHkjJeYScn7psMsVUoFmiNZjKwvdkCCF4Jp5r7qtGIhLjeOboekTKs_kMjomjWCCMSaOEa5PngEfmzaDJpFDCUyETJ6SC2zJZZNoZk3xHTv--fUW2u8O4P-nfD3pnZActlAHnzkk5Xa7hwhQAqbi0dv8CcCGvzA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Annual+Symposium+on+Foundations+of+Computer+Science&rft.atitle=Rational+Protocol+Design%3A+Cryptography+against+Incentive-Driven+Adversaries&rft.au=Garay%2C+Juan&rft.au=Katz%2C+Jonathan&rft.au=Maurer%2C+Ueli&rft.au=Tackmann%2C+Bjorn&rft.date=2013-10-01&rft.pub=IEEE&rft.issn=0272-5428&rft.spage=648&rft.epage=657&rft_id=info:doi/10.1109%2FFOCS.2013.75&rft.externalDocID=6686201 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0272-5428&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0272-5428&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0272-5428&client=summon |