Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2767386.2767431acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality

Published: 21 July 2015 Publication History

Abstract

Security of distributed cryptographic protocols usually requires privacy (inputs of the honest parties remain hidden), correctness (the adversary cannot improperly affect the outcome), and fairness (if the adversary learns the output, all honest parties do also). Cleve's seminal result (STOC '86) implies that satisfying these properties simultaneously is impossible in the presence of dishonest majorities, and led to several proposals for relaxed notions of fairness. While these works also suggest completeness results (i.e., the ability to design protocols which achieve their fairness notion), their assessment is typically of an all-or-nothing nature. In this work we put forth a new approach for defining relaxed fairness guarantees that allows for a quantitative comparison between protocols with regard to the level of fairness they achieve. The basic idea is to use an appropriate utility function to express the preferences of an adversary who wants to violate fairness. We also show optimal protocols with respect to our notion, in both the two-party and multi-party settings.

References

[1]
Gilad Asharov, Ran Canetti, and Carmit Hazay. Towards a game theoretic view of secure computation. In Kenneth G. Paterson, editor, EUROCRYPT 2011, volume 6632 of LNCS, pages 426--445, Heidelberg, 2011. Springer.
[2]
Donald Beaver and Shafi Goldwasser. Multiparty computation with faulty majority. In Proceedings of the 30th Symposium on Foundations of Computer Science, pages 468--473. IEEE, 1989.
[3]
Manuel Blum. How to exchange (secret) keys. ACM Transactions on Computer Science, 1:175--193, 1984.
[4]
Dan Boneh and Moni Naor. Timed commitments. In Mihir Bellare, editor, CRYPTO 2000, volume 1880 of LNCS, pages 236--254, Heidelberg, 2000. Springer.
[5]
Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13:143--202, April 2000.
[6]
Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, pages 136--145. IEEE, 2001.
[7]
Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067, December 2005. A preliminary version of this work appeared in FOCS:Canetti01.
[8]
Ran Canetti, Uri Feige, Oded Goldreich, and Moni Naor. Adaptively secure multi-party computation. In Twenty-Eighth Annual ACM Symposium on Theory of Computing, pages 639--648. ACM, ACM Press, 1995.
[9]
Richard E. Cleve. Limits on the security of coin flips when half the processors are faulty. In Proceedings of the 18th Annual ACM Symposium on Theory of Computing, pages 364--369, Berkeley, 1986. ACM.
[10]
Ivan Damgård. Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology, 8(4):201--222, 1995.
[11]
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient private matching and set intersection. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 1--19. Springer, 2004.
[12]
Juan A. Garay, David S. Johnson, Aggelos Kiayias, and Moti Yung. Resource-based corruptions and the combinatorics of hidden diversity. In Robert D. Kleinberg, editor, Innovations in Theoretical Computer Science, ITCS '13, Berkeley, CA, USA, pages 415--428. ACM, 2013.
[13]
Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas. Rational protocol design: Cryptography against incentive-driven adversaries. In 54th Annual Symposium on Foundations of Computer Science. IEEE, 2013.
[14]
Juan A. Garay, Jonathan Katz, Björn Tackmann, and Vassilis Zikas. How fair is your protocol? Cryptology ePrint Archive, Report 2015/187, March 2015.
[15]
Juan A. Garay, Philip MacKenzie, Manoj Prabhakaran, and Ke Yang. Resource fairness and composability of cryptographic protocols. In Shai Halevi and Tal Rabin, editors, TCC 2006, volume 3876 of LNCS, pages 404--428. Springer, 2006.
[16]
Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game--A completeness theorem for protocols with honest majority. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pages 218--229. ACM, 1987.
[17]
Dov Gordon and Jonathan Katz. Partial fairness in secure two-party computation. In Henry Gilbert, editor, EUROCRYPT 2010, volume 6110 of LNCS, pages 157--176. Springer, 2010.
[18]
Ronen Gradwohl, Salil Vadhan, and David Zuckerman. Random selection with an adversarial majority. In Proceedings of the 26th Annual International Conference on Advances in Cryptology, CRYPTO'06, pages 409--426, Berlin, Heidelberg, 2006. Springer-Verlag.
[19]
Adam Groce and Jonathan Katz. Fair computation with rational players. In David Pointcheval and Thomas Johansson, editors, EUROCRYPT 2012, volume 7237 of LNCS, pages 81--98. Springer, 2012.
[20]
Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas. Universally composable synchronous computation. In Amit Sahai, editor, TCC 2013, volume 7785 of LNCS, pages 477--498, Heidelberg, 2013. Springer.
[21]
Yehuda Lindell and Benny Pinkas. A proof of security of Yao's protocol for two-party computation. Journal of Cryptology, 22(2):161--188, April 2009.
[22]
Benny Pinkas. Fair secure two-party computation. In Eli Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 87--105, Heidelberg, 2003. Springer.

Cited By

View all
  • (2023)Rational Broadcast Protocols Against Timid AdversariesDecision and Game Theory for Security10.1007/978-3-031-50670-3_14(277-293)Online publication date: 29-Dec-2023
  • (2022)Secure Auctions in the Presence of Rational AdversariesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560706(1173-1186)Online publication date: 7-Nov-2022
  • (2022)Perfectly Secure Message Transmission Against Rational AdversariesIEEE Journal on Selected Areas in Information Theory10.1109/JSAIT.2022.31889233:2(390-404)Online publication date: Jun-2022
  • Show More Cited By

Index Terms

  1. How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODC '15: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
    July 2015
    508 pages
    ISBN:9781450336178
    DOI:10.1145/2767386
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 July 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. security
    2. theory

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    PODC '15
    Sponsor:
    PODC '15: ACM Symposium on Principles of Distributed Computing
    July 21 - 23, 2015
    Donostia-San Sebastián, Spain

    Acceptance Rates

    PODC '15 Paper Acceptance Rate 45 of 191 submissions, 24%;
    Overall Acceptance Rate 740 of 2,477 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Rational Broadcast Protocols Against Timid AdversariesDecision and Game Theory for Security10.1007/978-3-031-50670-3_14(277-293)Online publication date: 29-Dec-2023
    • (2022)Secure Auctions in the Presence of Rational AdversariesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560706(1173-1186)Online publication date: 7-Nov-2022
    • (2022)Perfectly Secure Message Transmission Against Rational AdversariesIEEE Journal on Selected Areas in Information Theory10.1109/JSAIT.2022.31889233:2(390-404)Online publication date: Jun-2022
    • (2022)-Round Game-Theoretically-Fair Leader ElectionAdvances in Cryptology – CRYPTO 202210.1007/978-3-031-15982-4_14(409-438)Online publication date: 15-Aug-2022
    • (2022)A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin TossAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-06944-4_5(120-149)Online publication date: 30-May-2022
    • (2021)Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party ComputationACM Transactions on Privacy and Security10.1145/347753025:1(1-34)Online publication date: 23-Nov-2021
    • (2021)Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader ElectionAdvances in Cryptology – CRYPTO 202110.1007/978-3-030-84245-1_1(3-32)Online publication date: 11-Aug-2021
    • (2020)The consensus equilibria of mining gap games related to the stability of Blockchain EcosystemsThe European Journal of Finance10.1080/1351847X.2020.177635227:4-5(419-440)Online publication date: 10-Jun-2020
    • (2019)The Consensus Games for Consensus Economics Under the Framework of Blockchain in FintechGame Theory10.1007/978-981-15-0657-4_1(1-26)Online publication date: 12-Oct-2019
    • (2019)Perfectly Secure Message Transmission Against Independent Rational AdversariesDecision and Game Theory for Security10.1007/978-3-030-32430-8_33(563-582)Online publication date: 30-Oct-2019
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media