Rational Protocol Design: Cryptography against Incentive-Driven Adversaries

Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from...

Full description

Saved in:
Bibliographic Details
Published inAnnual Symposium on Foundations of Computer Science pp. 648 - 657
Main Authors Garay, Juan, Katz, Jonathan, Maurer, Ueli, Tackmann, Bjorn, Zikas, Vassilis
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2013
Subjects
Online AccessGet full text
ISSN0272-5428
DOI10.1109/FOCS.2013.75

Cover

Abstract Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrupting protocol participants; the goal of the protocol designer is to prevent the attacker from succeeding. We lay the theoretical groundwork for a study of cryptographic protocol design in this setting by providing a methodology for defining the problem within the traditional simulation paradigm. Our framework provides ways of reasoning about important cryptographic concepts (e.g., adaptive corruptions or attacks on communication resources) not handled by previous game-theoretic treatments of cryptography. We also prove composition theorems that-for the first time-provide a sound way to design rational protocols assuming "ideal communication resources" (such as broadcast or authenticated channels) and then instantiate these resources using standard cryptographic tools. Finally, we investigate the problem of secure function evaluation in our framework, where the attacker has to pay for each party it corrupts. Our results demonstrate how knowledge of the attacker's incentives can be used to circumvent known impossibility results in this setting.
AbstractList Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrupting protocol participants; the goal of the protocol designer is to prevent the attacker from succeeding. We lay the theoretical groundwork for a study of cryptographic protocol design in this setting by providing a methodology for defining the problem within the traditional simulation paradigm. Our framework provides ways of reasoning about important cryptographic concepts (e.g., adaptive corruptions or attacks on communication resources) not handled by previous game-theoretic treatments of cryptography. We also prove composition theorems that-for the first time-provide a sound way to design rational protocols assuming "ideal communication resources" (such as broadcast or authenticated channels) and then instantiate these resources using standard cryptographic tools. Finally, we investigate the problem of secure function evaluation in our framework, where the attacker has to pay for each party it corrupts. Our results demonstrate how knowledge of the attacker's incentives can be used to circumvent known impossibility results in this setting.
Author Maurer, Ueli
Tackmann, Bjorn
Katz, Jonathan
Garay, Juan
Zikas, Vassilis
Author_xml – sequence: 1
  givenname: Juan
  surname: Garay
  fullname: Garay, Juan
  email: garay@research.att.com
– sequence: 2
  givenname: Jonathan
  surname: Katz
  fullname: Katz, Jonathan
  email: jkatz@cs.umd.edu
– sequence: 3
  givenname: Ueli
  surname: Maurer
  fullname: Maurer, Ueli
  email: maurer@inf.ethz.ch
– sequence: 4
  givenname: Bjorn
  surname: Tackmann
  fullname: Tackmann, Bjorn
  email: bjoernt@inf.ethz.ch
– sequence: 5
  givenname: Vassilis
  surname: Zikas
  fullname: Zikas, Vassilis
  email: vzikas@cs.ucla.edu
BookMark eNotj81LwzAcQCNMcJu7efPSf6A13229jc7pcDDx4zzS9JcaqUlJwqD__RS9vHd78BZo5rwDhG4ILgjB9d320LwVFBNWlOICreqywqWshSBMlDM0x7SkueC0ukKLGL8w5lhgNkfPrypZ79SQvQSfvPZDtoFoe3efNWEak--DGj-nTPXKupiyndPgkj1Bvgk_dNm6O0GIKliI1-jSqCHC6t9L9LF9eG-e8v3hcdes97mlnKS8baGuiNEUqMZSa87rVhqNdUk72klDlTHAGRFEV1ABgZYYLjqmWgWqE5Qt0e1f1wLAcQz2W4XpKGUlf__PJMtQUQ
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/FOCS.2013.75
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISBN 9780769551357
0769551351
EndPage 657
ExternalDocumentID 6686201
Genre orig-research
GroupedDBID -~X
23M
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ACNCT
ADZIZ
AFFNX
AI.
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IPLJI
OCL
RIE
RIL
RIO
RNS
VH1
ID FETCH-LOGICAL-i241t-bbe981fc2e2c06cc449b6fc0c72d2d6f2affe43151c8e8e1eb1f45d3abaead523
IEDL.DBID RIE
ISSN 0272-5428
IngestDate Wed Aug 27 03:51:38 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i241t-bbe981fc2e2c06cc449b6fc0c72d2d6f2affe43151c8e8e1eb1f45d3abaead523
PageCount 10
ParticipantIDs ieee_primary_6686201
PublicationCentury 2000
PublicationDate 2013-10
PublicationDateYYYYMMDD 2013-10-01
PublicationDate_xml – month: 10
  year: 2013
  text: 2013-10
PublicationDecade 2010
PublicationTitle Annual Symposium on Foundations of Computer Science
PublicationTitleAbbrev SFCS
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0040503
ssib026763816
Score 1.8227465
Snippet Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its...
SourceID ieee
SourceType Publisher
StartPage 648
SubjectTerms Composition
Cryptography
Game theory
Games
Privacy
Protocols
Secure Computation
Title Rational Protocol Design: Cryptography against Incentive-Driven Adversaries
URI https://ieeexplore.ieee.org/document/6686201
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA5zT_rij038TR98NN2apWnj6-YYylTUwd5Gk1xkCNvYOkH_enNpV0V88K2UFkLuene5ft93hFzGsm3ASE2ZS76Uu5qDqkgpChnWv1YZGyPBeXgvBiN-O47HNXJVcWEAwIPPIMRL_y_fzPUaW2UtgXQGJGttJakouFob32HCfSgpljpFFOaoc-L7Kwlq_bO0Ar3LVv-h-4ygrk6I6MIfQ1V8TunvkuFmNQWU5C1c5yrUn7-EGv-73D3S_GbvBY9VXtonNZgdkJ1hpc-6apC7p7IHiA_mc-cMQc9DOa6D7vJjkZc61kH2mk1d_Ri4KIKoonegvSWGx8DPcV75c3aTjPo3L90BLccq0KlL1zlVCmQaWc2A6bbQmnOJjJ-2TphhRliWWQuurogjnUIKkYvmlsemk6nMuZ07uB6S-mw-gyMSGCaUM6jMuHVZDrh0b4qEaWVUZFKmjkkDt2WyKJQzJuWOnPx9-5Rso1UKqNwZqefLNZy7lJ-rC2_rLzjLrH8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0QPKgXP8D4bQ8e3UKXbWm9ggSFolFIuJHu7qwhJkCgmOivd2dbqjEevDVNm2x2pjOz0_feEHLtR3UFKpKUmeRLuak5qPCEoJBg_auF0j4SnONB0B3xh7E_LpGbggsDABZ8Bi5e2n_5ai7X2CqrBUhnQLLWls859zO21sZ7WGA-lRCLnSwOc1Q6sR2WJqr9s7CAvUe1zmPrBWFdDRfxhT_Gqtis0tkj8WY9GZjkzV2nwpWfv6Qa_7vgfVL95u85T0VmOiAlmB2S3bhQaF1VSO857wLig-ncuIPTtmCOW6e1_FikuZK1k7wmU1NBOiaOIK7oHWh7iQHSsZOcV_akXSWjzt2w1aX5YAU6NQk7pUJAFHpaMmCyHkjJeYScn7psMsVUoFmiNZjKwvdkCCF4Jp5r7qtGIhLjeOboekTKs_kMjomjWCCMSaOEa5PngEfmzaDJpFDCUyETJ6SC2zJZZNoZk3xHTv--fUW2u8O4P-nfD3pnZActlAHnzkk5Xa7hwhQAqbi0dv8CcCGvzA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Annual+Symposium+on+Foundations+of+Computer+Science&rft.atitle=Rational+Protocol+Design%3A+Cryptography+against+Incentive-Driven+Adversaries&rft.au=Garay%2C+Juan&rft.au=Katz%2C+Jonathan&rft.au=Maurer%2C+Ueli&rft.au=Tackmann%2C+Bjorn&rft.date=2013-10-01&rft.pub=IEEE&rft.issn=0272-5428&rft.spage=648&rft.epage=657&rft_id=info:doi/10.1109%2FFOCS.2013.75&rft.externalDocID=6686201
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0272-5428&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0272-5428&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0272-5428&client=summon