메뉴 건너뛰기




Volumn , Issue , 2013, Pages 648-657

Rational protocol design: Cryptography against incentive-driven adversaries

Author keywords

Composition; Cryptographic protocols; Game theory; Secure computation

Indexed keywords

ADAPTIVE CORRUPTIONS; AUTHENTICATED CHANNEL; COMMUNICATION RESOURCES; CRYPTOGRAPHIC CONCEPTS; CRYPTOGRAPHIC PROTOCOLS; IMPOSSIBILITY RESULTS; SECURE COMPUTATION; SECURE FUNCTION EVALUATION;

EID: 84893486709     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2013.75     Document Type: Conference Paper
Times cited : (80)

References (35)
  • 1
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation: Extended abstract
    • L. Babai, Ed. Chicago, Illinois, USA: ACM Press, Jun. 13-16
    • J. Y. Halpern and V. Teague, "Rational secret sharing and multiparty computation: Extended abstract, " in STOC 2004, L. Babai, Ed. Chicago, Illinois, USA: ACM Press, Jun. 13-16, 2004, pp. 623-632.
    • (2004) STOC 2004 , pp. 623-632
    • Halpern, J.Y.1    Teague, V.2
  • 2
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • E. Ruppert and D. Malkhi, Eds. Denver, Colorado, USA: ACM Press, Jul. 23-26
    • I. Abraham, D. Dolev, R. Gonen, and J. Y. Halpern, "Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation, " in PODC 2006, E. Ruppert and D. Malkhi, Eds. Denver, Colorado, USA: ACM Press, Jul. 23-26, 2006, pp. 53-62.
    • (2006) PODC 2006 , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.Y.4
  • 3
    • 40249088241 scopus 로고    scopus 로고
    • Cryptography and game theory: Designing protocols for exchanging information
    • ser. LNCS, R. Canetti, Ed. vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21
    • G. Kol and M. Naor, "Cryptography and game theory: Designing protocols for exchanging information, " in TCC 2008, ser. LNCS, R. Canetti, Ed., vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21, 2008, pp. 320-339.
    • (2008) TCC 2008 , pp. 320-339
    • Kol, G.1    Naor, M.2
  • 4
    • 77949642603 scopus 로고    scopus 로고
    • Efficient rational secret sharing in standard communication networks
    • ser. LNCS, D. Micciancio, Ed., Zurich, Switzerland: Springer, Berlin, Germany, Feb. 9-11
    • G. Fuchsbauer, J. Katz, and D. Naccache, "Efficient rational secret sharing in standard communication networks, " in TCC 2010, ser. LNCS, D. Micciancio, Ed., vol. 5978. Zurich, Switzerland: Springer, Berlin, Germany, Feb. 9-11, 2010, pp. 419-436.
    • (2010) TCC 2010 , vol.5978 , pp. 419-436
    • Fuchsbauer, G.1    Katz, J.2    Naccache, D.3
  • 5
    • 78751516976 scopus 로고    scopus 로고
    • Game theory with costly computation: Formulation and application to protocol security
    • A. C.-C. Yao, Ed. Tsinghua University Press
    • J. Y. Halpern and R. Pass, "Game theory with costly computation: Formulation and application to protocol security, " in ICS 2010, A. C.-C. Yao, Ed. Tsinghua University Press, 2010, pp. 120-142.
    • (2010) ICS 2010 , pp. 120-142
    • Halpern, J.Y.1    Pass, R.2
  • 6
    • 79957983000 scopus 로고    scopus 로고
    • Towards a game-theoretic view of secure computation
    • ser. LNCS, K. G. Paterson, Ed., Springer
    • G. Asharov, R. Canetti, and C. Hazay, "Towards a game-theoretic view of secure computation, " in EUROCRYPT 2011, ser. LNCS, K. G. Paterson, Ed., vol. 6632. Springer, 2011, pp. 426-445.
    • (2011) EUROCRYPT 2011 , vol.6632 , pp. 426-445
    • Asharov, G.1    Canetti, R.2    Hazay, C.3
  • 7
    • 84859972604 scopus 로고    scopus 로고
    • Fair computation with rational players
    • ser. LNCS, D. Pointcheval and T. Johansson, Eds., Springer
    • A. Groce and J. Katz, "Fair computation with rational players, " in EUROCRYPT 2012, ser. LNCS, D. Pointcheval and T. Johansson, Eds., vol. 7237. Springer, 2012, pp. 81-98.
    • (2012) EUROCRYPT 2012 , vol.7237 , pp. 81-98
    • Groce, A.1    Katz, J.2
  • 8
    • 84974555688 scopus 로고    scopus 로고
    • A cryptographic solution to a game theoretic problem
    • ser. LNCS, M. Bellare, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24
    • Y. Dodis, S. Halevi, and T. Rabin, "A cryptographic solution to a game theoretic problem, " in CRYPTO 2000, ser. LNCS, M. Bellare, Ed., vol. 1880. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24, 2000, pp. 112-130.
    • (2000) CRYPTO 2000 , vol.1880 , pp. 112-130
    • Dodis, Y.1    Halevi, S.2    Rabin, T.3
  • 9
    • 10444265884 scopus 로고    scopus 로고
    • Completely fair SFE and coalition-safe cheap talk
    • S. Chaudhuri and S. Kutten, Eds. St. John's, Newfoundland, Canada: ACM Press, Jul. 25-28
    • M. Lepinski, S. Micali, C. Peikert, and A. Shelat, "Completely fair SFE and coalition-safe cheap talk, " in PODC 2004, S. Chaudhuri and S. Kutten, Eds. St. John's, Newfoundland, Canada: ACM Press, Jul. 25-28, 2004, pp. 1-10.
    • (2004) PODC 2004 , pp. 1-10
    • Lepinski, M.1    Micali, S.2    Peikert, C.3    Shelat, A.4
  • 10
    • 33748680791 scopus 로고    scopus 로고
    • Collusion-free protocols
    • H. N. Gabow and R. Fagin, Eds. Baltimore, Maryland, USA: ACM Press, May 22- 24
    • M. Lepinski, S. Micali, and A. Shelat, "Collusion-free protocols, " in STOC 2005, H. N. Gabow and R. Fagin, Eds. Baltimore, Maryland, USA: ACM Press, May 22- 24, 2005, pp. 543-552.
    • (2005) STOC 2005 , pp. 543-552
    • Lepinski, M.1    Micali, S.2    Shelat, A.3
  • 11
    • 33748582624 scopus 로고    scopus 로고
    • Rational secure computation and ideal mechanism design
    • Pittsburgh, PA, USA: IEEE Computer Society Press, Oct. 23-25
    • S. Izmalkov, S. Micali, and M. Lepinski, "Rational secure computation and ideal mechanism design, " in FOCS 2005. Pittsburgh, PA, USA: IEEE Computer Society Press, Oct. 23-25, 2005, pp. 585-595.
    • (2005) FOCS 2005 , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 12
    • 40249119683 scopus 로고    scopus 로고
    • Verifiably secure devices
    • ser. LNCS, R. Canetti, Ed., San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21
    • S. Izmalkov, M. Lepinski, and S. Micali, "Verifiably secure devices, " in TCC 2008, ser. LNCS, R. Canetti, Ed., vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21, 2008, pp. 273-301.
    • (2008) TCC 2008 , vol.4948 , pp. 273-301
    • Izmalkov, S.1    Lepinski, M.2    Micali, S.3
  • 13
    • 38049082907 scopus 로고    scopus 로고
    • Security against covert adversaries: Efficient protocols for realistic adversaries
    • ser. LNCS, S. Vadhan, Ed., Springer
    • Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries, " in TCC 2007, ser. LNCS, S. Vadhan, Ed., vol. 4392. Springer, 2007, pp. 137-156.
    • (2007) TCC 2007 , vol.4392 , pp. 137-156
    • Aumann, Y.1    Lindell, Y.2
  • 15
    • 33750018128 scopus 로고    scopus 로고
    • Rational secret sharing, revisited
    • ser. LNCS, R. D. Prisco and M. Yung, Eds., Maiori, Italy: Springer, Berlin, Germany, Sep. 6-8
    • S. D. Gordon and J. Katz, "Rational secret sharing, revisited, " in SCN 2006, ser. LNCS, R. D. Prisco and M. Yung, Eds., vol. 4116. Maiori, Italy: Springer, Berlin, Germany, Sep. 6-8, 2006, pp. 229-241.
    • (2006) SCN 2006 , vol.4116 , pp. 229-241
    • Gordon, S.D.1    Katz, J.2
  • 16
    • 57049100461 scopus 로고    scopus 로고
    • Games for exchanging information
    • C. Dwork, Ed. Victoria, British Columbia, Canada: ACM Press, May 17-20
    • G. Kol and M. Naor, "Games for exchanging information, " in STOC 2008, C. Dwork, Ed. Victoria, British Columbia, Canada: ACM Press, May 17-20, 2008, pp. 423-432.
    • (2008) STOC 2008 , pp. 423-432
    • Kol, G.1    Naor, M.2
  • 17
    • 57549103743 scopus 로고    scopus 로고
    • Beyond Nash equilibrium: Solution concepts for the 21st century
    • R. A. Bazzi and B. Patt-Shamir, Eds. Toronto, Ontario, Canada: ACM Press, Aug. 18-21
    • J. Y. Halpern, "Beyond Nash equilibrium: Solution concepts for the 21st century, " in PODC 2008, R. A. Bazzi and B. Patt-Shamir, Eds. Toronto, Ontario, Canada: ACM Press, Aug. 18-21, 2008, pp. 1-10.
    • (2008) PODC 2008 , pp. 1-10
    • Halpern, J.Y.1
  • 18
    • 78751541044 scopus 로고    scopus 로고
    • Sequential rationality in cryptographic protocols
    • IEEE Computer Society Press
    • R. Gradwohl, N. Livne, and A. Rosen, "Sequential rationality in cryptographic protocols, " in FOCS 2010. IEEE Computer Society Press, 2010, pp. 623-632.
    • (2010) FOCS 2010 , pp. 623-632
    • Gradwohl, R.1    Livne, N.2    Rosen, A.3
  • 19
    • 77954649870 scopus 로고    scopus 로고
    • Partial fairness in secure twoparty computation
    • ser. LNCS, H. Gilbert, Ed., Springer
    • D. Gordon and J. Katz, "Partial fairness in secure twoparty computation, " in EUROCRYPT 2010, ser. LNCS, H. Gilbert, Ed., vol. 6110. Springer, 2010, pp. 157-176.
    • (2010) EUROCRYPT 2010 , vol.6110 , pp. 157-176
    • Gordon, D.1    Katz, J.2
  • 20
    • 80051969535 scopus 로고    scopus 로고
    • 1/psecure multiparty computation without honest majority and the best of both worlds
    • ser. LNCS, P. Rogaway, Ed., Springer
    • A. Beimel, Y. Lindell, E. Omri, and I. Orlov, "1/psecure multiparty computation without honest majority and the best of both worlds, " in CRYPTO 2011, ser. LNCS, P. Rogaway, Ed., vol. 6841. Springer, 2011, pp. 277-296.
    • (2011) CRYPTO 2011 , vol.6841 , pp. 277-296
    • Beimel, A.1    Lindell, Y.2    Omri, E.3    Orlov, I.4
  • 21
    • 51849140874 scopus 로고    scopus 로고
    • Collusion-free protocols in the mediated model
    • LNCS, D. Wagner, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 17-21
    • J. Alwen, A. Shelat, and I. Visconti, "Collusion-free protocols in the mediated model, " in CRYPTO 2008, LNCS, D. Wagner, Ed., vol. 5157. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 17-21, 2008, pp. 497-514.
    • (2008) CRYPTO 2008 , vol.5157 , pp. 497-514
    • Alwen, J.1    Shelat, A.2    Visconti, I.3
  • 22
    • 70350304833 scopus 로고    scopus 로고
    • Collusion-free multiparty computation in the mediated model
    • ser. LNCS, S. Halevi, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 16-20
    • J. Alwen, J. Katz, Y. Lindell, G. Persiano, A. Shelat, and I. Visconti, "Collusion-free multiparty computation in the mediated model, " in CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 16-20, 2009, pp. 524- 540.
    • (2009) CRYPTO 2009 , vol.5677 , pp. 524-540
    • Alwen, J.1    Katz, J.2    Lindell, Y.3    Persiano, G.4    Shelat, A.5    Visconti, I.6
  • 23
    • 84865489601 scopus 로고    scopus 로고
    • Collusionpreserving computation
    • ser. LNCS, R. Canetti and J. Garay, Eds. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug
    • J. Alwen, J. Katz, U. Maurer, and V. Zikas, "Collusionpreserving computation, " in CRYPTO 2012, ser. LNCS, R. Canetti and J. Garay, Eds. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 2012, pp. 124-143.
    • (2012) CRYPTO 2012 , pp. 124-143
    • Alwen, J.1    Katz, J.2    Maurer, U.3    Zikas, V.4
  • 24
    • 84884200633 scopus 로고    scopus 로고
    • Byzantine agreement with a rational adversary
    • ser. LNCS. Springer, Berlin, Germany
    • A. Groce, J. Katz, A. Thiruvengadam, and V. Zikas, "Byzantine agreement with a rational adversary, " in ICALP 2012, ser. LNCS. Springer, Berlin, Germany, 2012, pp. 561-572.
    • (2012) ICALP 2012 , pp. 561-572
    • Groce, A.1    Katz, J.2    Thiruvengadam, A.3    Zikas, V.4
  • 25
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • April
    • R. Canetti, "Security and composition of multiparty cryptographic protocols, " Journal of Cryptology, vol. 13, pp. 143-202, April 2000.
    • (2000) Journal of Cryptology , vol.13 , pp. 143-202
    • Canetti, R.1
  • 26
    • 84873944088 scopus 로고    scopus 로고
    • Universally composable synchronous computation
    • ser. LNCS, A. Sahai, Ed., Springer, March
    • J. Katz, U. Maurer, B. Tackmann, and V. Zikas, "Universally composable synchronous computation, " in TCC 2013, ser. LNCS, A. Sahai, Ed., vol. 7785. Springer, March 2013, pp. 477-498.
    • (2013) TCC 2013 , vol.7785 , pp. 477-498
    • Katz, J.1    Maurer, U.2    Tackmann, B.3    Zikas, V.4
  • 28
    • 0023545076 scopus 로고
    • How to play any mental game, or a completeness theorem for protocols with honest majority
    • A. Aho, Ed, New York City, New York, USA: ACM Press, May 25-27
    • O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game, or a completeness theorem for protocols with honest majority, " in STOC '87, A. Aho, Ed. New York City, New York, USA: ACM Press, May 25-27, 1987, pp. 218-229.
    • (1987) STOC '87 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 29
    • 84873362733 scopus 로고    scopus 로고
    • Resource-based corruptions and the combinatorics of hidden diversity
    • R. D. Kleinberg, Ed. ACM
    • J. A. Garay, D. Johnson, A. Kiayias, and M. Yung, "Resource-based corruptions and the combinatorics of hidden diversity, " in ITCS 2013, R. D. Kleinberg, Ed. ACM, 2013, pp. 415-428.
    • (2013) ITCS 2013 , pp. 415-428
    • Garay, J.A.1    Johnson, D.2    Kiayias, A.3    Yung, M.4
  • 30
    • 35448952561 scopus 로고    scopus 로고
    • On achieving the 'best of both worlds' in secure multiparty computation
    • U. Feige, Ed. San Diego, California, USA: ACM Press, June 11-13
    • J. Katz, "On achieving the 'best of both worlds' in secure multiparty computation, " in STOC 2007, U. Feige, Ed. San Diego, California, USA: ACM Press, June 11-13, 2007, pp. 11-20.
    • (2007) STOC 2007 , pp. 11-20
    • Katz, J.1
  • 31
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • G. L. Miller, Ed. Philadelphia, Pennsylvania, USA: ACM Press, May 22-24
    • R. Canetti, U. Feige, O. Goldreich, and M. Naor, "Adaptively secure multi-party computation, " in STOC '96, G. L. Miller, Ed. Philadelphia, Pennsylvania, USA: ACM Press, May 22-24, 1996, pp. 639-648.
    • (1996) STOC '96 , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 32
    • 0036038991 scopus 로고    scopus 로고
    • Universally composable two-party and multi-party secure computation
    • J. H. Reif, Ed. Montŕeal, Qúebec, Canada: ACM Press, May 19-21
    • R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai, "Universally composable two-party and multi-party secure computation, " in STOC 2002, J. H. Reif, Ed. Montŕeal, Qúebec, Canada: ACM Press, May 19-21, 2002, pp. 494-503.
    • (2002) STOC 2002 , pp. 494-503
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 33
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • Las Vegas, Nevada, USA: IEEE Computer Society Press, Oct. 14-17, Updated full version available at
    • R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in FOCS 2001. Las Vegas, Nevada, USA: IEEE Computer Society Press, Oct. 14-17, 2001, pp. 136-145. Updated full version available at http://eprint.iacr.org/2000/067.
    • (2001) FOCS 2001 , pp. 136-145
    • Canetti, R.1
  • 34
    • 0032687056 scopus 로고    scopus 로고
    • Secure Computation with honest-looking parties: What if nobody is truly honest?
    • J. S. Vitter, L. L. Larmore, F. Thomson Leighton, Eds. Atlanta, Georgia, USA: ACM Press, May 1-4
    • R. Canetti and R. Ostrovsky, "Secure Computation with honest-looking parties: What if nobody is truly honest?" in STOC '99, J. S. Vitter, L. L. Larmore, F. Thomson Leighton, Eds. Atlanta, Georgia, USA: ACM Press, May 1-4, 1999, pp. 255-264.
    • (1999) STOC '99 , pp. 255-264
    • Canetti, R.1    Ostrovsky, R.2
  • 35
    • 33749547215 scopus 로고    scopus 로고
    • On combining privacy with guaranteed output delivery in secure multiparty computation
    • ser. LNCS, Cynthia Dwork, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24
    • Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. "On combining privacy with guaranteed output delivery in secure multiparty computation, " in CRYPTO 2006, ser. LNCS, Cynthia Dwork, Ed., vol. 4117. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24, 2006, pp. 483-500.
    • (2006) CRYPTO 2006 , vol.4117 , pp. 483-500
    • Ishai, Y.1    Kushilevitz, E.2    Lindell, Y.3    Petrank, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.