game theory and cryptography - peoplechristos/agt09/crypto.pdf · game theory and cryptography 1 /...

228
Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department of Electrical Engineering and Computer Sciences University of California, Berkeley March 10, 2009 UC Berkeley Nebojsa Milosavljevic, Anupam Prakash UCBseal

Upload: doankhue

Post on 09-May-2019

231 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography 1 / 47

Game Theory and Cryptography

Nebojsa Milosavljevic, Anupam Prakash

Department of Electrical Engineering and Computer SciencesUniversity of California, Berkeley

March 10, 2009

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 2: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Introduction 2 / 47

Introduction

• Interaction between game theory and cryptography:

• Cryptography → Game Theory

Implementation of correlated equilibrium in the absence of a trustedmediator.

• Game Theory → Cryptography

Instead of having agents follow a cryptographic protocol blindly, whathappens if the agents are rational and attempt to maximize theirpayoffs?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 3: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Introduction 2 / 47

Introduction

• Interaction between game theory and cryptography:

• Cryptography → Game Theory

Implementation of correlated equilibrium in the absence of a trustedmediator.

• Game Theory → Cryptography

Instead of having agents follow a cryptographic protocol blindly, whathappens if the agents are rational and attempt to maximize theirpayoffs?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 4: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 5: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 6: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 7: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 8: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 9: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 10: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 3 / 47

Multi Party Computation

• There are n players who wish to compute f(t1, t2, · · · , tn) = s.

• Input ti is with player i.

• The information learnt by player i at the end of the protocol mustbe (ti, s).

• Probabilistic: s = f(t1, t2, · · · , tn, r).

• Multi-output: f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn).

• No trusted party, honest but curious and malicious adversaries.

• General adversary: controls k < n players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 11: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 4 / 47

Example: Distrustful Millionaires

Who is the World’s Richest Duck?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 12: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 5 / 47

Example: Mental Games

Playing bridge with additional information

Removing God in Mafia

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 13: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 5 / 47

Example: Mental Games

Playing bridge with additional informationRemoving God in Mafia

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 14: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 15: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 16: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 17: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 18: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 19: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 6 / 47

Security of MPC

• Intuition: Outputs of the real protocol should be indistinguishablefrom the outputs when a trusted party is present.

• A: Adversary controlling k < n players in real model. (A′ in idealmodel)

• t: Input vector.

• REALA,π(t): Outputs of honest players and adversary A under π.

• IDEALA′ (t): Outputs of honest players and adversary A′

withtrusted party.

• For every input vector t, REALA,π(t) ≈ IDEALA′ (t).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 20: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 21: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 22: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 23: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 24: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 25: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 7 / 47

Weaker notions of security

• This definition guarantees output delivery as outputs of thehonest players are included in REALA,π(t).

• If A′

can get the protocol aborted in the presence of a trustedparty, the guarantee obtained is fairness.

• Fairness: If the output is revealed to some parties, all honestparties eventually receive the output.

• Weakest guarantee: Correctness and privacy.

• Guaranteed Output Delivery > Fairness > Correctness and Privacy

• Issues: Indistinguishability, communication model.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 26: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 8 / 47

Indistinguishability

• All communication, computation is polynomial in λ, the securityparameter.

• Notions of indistinguishability between distributions p and q.

• Perfect: The two distributions are the same.

• Statistical: Statistical distance between the distributions(1/2

∑x |p(x)− q(x)|) is negligible.

• Computational: A computationally bounded adversary can notdistinguish between p and q with non-negligible probability.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 27: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 8 / 47

Indistinguishability

• All communication, computation is polynomial in λ, the securityparameter.

• Notions of indistinguishability between distributions p and q.

• Perfect: The two distributions are the same.

• Statistical: Statistical distance between the distributions(1/2

∑x |p(x)− q(x)|) is negligible.

• Computational: A computationally bounded adversary can notdistinguish between p and q with non-negligible probability.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 28: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 8 / 47

Indistinguishability

• All communication, computation is polynomial in λ, the securityparameter.

• Notions of indistinguishability between distributions p and q.

• Perfect: The two distributions are the same.

• Statistical: Statistical distance between the distributions(1/2

∑x |p(x)− q(x)|) is negligible.

• Computational: A computationally bounded adversary can notdistinguish between p and q with non-negligible probability.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 29: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 8 / 47

Indistinguishability

• All communication, computation is polynomial in λ, the securityparameter.

• Notions of indistinguishability between distributions p and q.

• Perfect: The two distributions are the same.

• Statistical: Statistical distance between the distributions(1/2

∑x |p(x)− q(x)|) is negligible.

• Computational: A computationally bounded adversary can notdistinguish between p and q with non-negligible probability.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 30: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 8 / 47

Indistinguishability

• All communication, computation is polynomial in λ, the securityparameter.

• Notions of indistinguishability between distributions p and q.

• Perfect: The two distributions are the same.

• Statistical: Statistical distance between the distributions(1/2

∑x |p(x)− q(x)|) is negligible.

• Computational: A computationally bounded adversary can notdistinguish between p and q with non-negligible probability.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 31: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 9 / 47

Communication

• Secure and authenticated channels for communication betweentwo players.

• Broadcast channels: When a message is broadcast, everybodyreceives the same message. (Reason!)

Definition

Envelopes must satisfy the following properties:a) Value contained in envelope is hidden until it is opened.b) Envelope can be opened only by the person who possesses it.c) Encelope can not be opened in secret and resealed.

• Ballot Boxes: A device to randomize a sequence of envelopes.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 32: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 9 / 47

Communication

• Secure and authenticated channels for communication betweentwo players.

• Broadcast channels: When a message is broadcast, everybodyreceives the same message. (Reason!)

Definition

Envelopes must satisfy the following properties:a) Value contained in envelope is hidden until it is opened.b) Envelope can be opened only by the person who possesses it.c) Encelope can not be opened in secret and resealed.

• Ballot Boxes: A device to randomize a sequence of envelopes.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 33: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 9 / 47

Communication

• Secure and authenticated channels for communication betweentwo players.

• Broadcast channels: When a message is broadcast, everybodyreceives the same message. (Reason!)

Definition

Envelopes must satisfy the following properties:a) Value contained in envelope is hidden until it is opened.b) Envelope can be opened only by the person who possesses it.c) Encelope can not be opened in secret and resealed.

• Ballot Boxes: A device to randomize a sequence of envelopes.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 34: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 9 / 47

Communication

• Secure and authenticated channels for communication betweentwo players.

• Broadcast channels: When a message is broadcast, everybodyreceives the same message. (Reason!)

Definition

Envelopes must satisfy the following properties:a) Value contained in envelope is hidden until it is opened.b) Envelope can be opened only by the person who possesses it.c) Encelope can not be opened in secret and resealed.

• Ballot Boxes: A device to randomize a sequence of envelopes.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 35: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 36: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 37: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 38: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 39: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 40: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 10 / 47

MPC Results

• Table 1: Computationally Bounded AdversaryAdversary Guarantee Communicationk < n/2 output delivery broadcast

k < n correctness privacy broadcast

k < n fairness envelopes

• Table 2: Computationally Unbounded AdversaryAdversary Guarantee Communicationk < n/3 output delivery secure channel

k < n/2 output delivery (error) broadcast

k < n output delivery ballot boxes

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 41: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 11 / 47

How is it done?

• Secret sharing: Choose a polynomial p(x) of degree k over thefinite field Fq. Player i gets (ai, p(ai)), where ai 6= 0. The secretis the constant term of p(x).

• A group of k parties can not recover any information about thesecret, while a group of k + 1 can recover it completely.

• Computation is carried out gate by gate in the secret sharerepresentation. (Imprecise, read ‘How to play any mental game’-GMW).

• Oblivious transfer, attend last few lectures of the cryptographyclass to know more.

• Finally everybody broadcasts the secret shares corresponding tothe output.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 42: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 11 / 47

How is it done?

• Secret sharing: Choose a polynomial p(x) of degree k over thefinite field Fq. Player i gets (ai, p(ai)), where ai 6= 0. The secretis the constant term of p(x).

• A group of k parties can not recover any information about thesecret, while a group of k + 1 can recover it completely.

• Computation is carried out gate by gate in the secret sharerepresentation. (Imprecise, read ‘How to play any mental game’-GMW).

• Oblivious transfer, attend last few lectures of the cryptographyclass to know more.

• Finally everybody broadcasts the secret shares corresponding tothe output.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 43: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 11 / 47

How is it done?

• Secret sharing: Choose a polynomial p(x) of degree k over thefinite field Fq. Player i gets (ai, p(ai)), where ai 6= 0. The secretis the constant term of p(x).

• A group of k parties can not recover any information about thesecret, while a group of k + 1 can recover it completely.

• Computation is carried out gate by gate in the secret sharerepresentation. (Imprecise, read ‘How to play any mental game’-GMW).

• Oblivious transfer, attend last few lectures of the cryptographyclass to know more.

• Finally everybody broadcasts the secret shares corresponding tothe output.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 44: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 11 / 47

How is it done?

• Secret sharing: Choose a polynomial p(x) of degree k over thefinite field Fq. Player i gets (ai, p(ai)), where ai 6= 0. The secretis the constant term of p(x).

• A group of k parties can not recover any information about thesecret, while a group of k + 1 can recover it completely.

• Computation is carried out gate by gate in the secret sharerepresentation. (Imprecise, read ‘How to play any mental game’-GMW).

• Oblivious transfer, attend last few lectures of the cryptographyclass to know more.

• Finally everybody broadcasts the secret shares corresponding tothe output.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 45: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Multi Party Computation 11 / 47

How is it done?

• Secret sharing: Choose a polynomial p(x) of degree k over thefinite field Fq. Player i gets (ai, p(ai)), where ai 6= 0. The secretis the constant term of p(x).

• A group of k parties can not recover any information about thesecret, while a group of k + 1 can recover it completely.

• Computation is carried out gate by gate in the secret sharerepresentation. (Imprecise, read ‘How to play any mental game’-GMW).

• Oblivious transfer, attend last few lectures of the cryptographyclass to know more.

• Finally everybody broadcasts the secret shares corresponding tothe output.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 46: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 47: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 48: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 49: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 50: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 51: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 12 / 47

Correlated Equilibrium

• Definition

A correlated equilibrium is a distribution D over strategies such thatEs∼D|si

[ui(si, s−i)] ≥ Es∼D|si[ui(s∗i , s−i)] for all players i and all

alternative strategies s∗i .

• Privacy of the strategies revealed to the players is essential bydefinition.

• Better payoffs than Nash, computable in polynomial time fornormal form games.

• Tractable for several types of succinct games. (P-05).

• Would make Nash redundant, if we could implement it without atrusted mediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 52: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 13 / 47

Ways to remove the mediator

• We will see two approaches to the removal of the mediator.

Simulating MPC

The players run an MPC protocol in the preamble that performs thecomputation f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn) previously carriedout by the mediator.

Verifiable Mediator

The trusted mediator is replaced by a verifiable device, which carriesout computation in public while maintaining privacy.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 53: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 13 / 47

Ways to remove the mediator

• We will see two approaches to the removal of the mediator.

Simulating MPC

The players run an MPC protocol in the preamble that performs thecomputation f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn) previously carriedout by the mediator.

Verifiable Mediator

The trusted mediator is replaced by a verifiable device, which carriesout computation in public while maintaining privacy.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 54: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 13 / 47

Ways to remove the mediator

• We will see two approaches to the removal of the mediator.

Simulating MPC

The players run an MPC protocol in the preamble that performs thecomputation f(t1, t2, · · · , tn, r) = (s1, s2, · · · , sn) previously carriedout by the mediator.

Verifiable Mediator

The trusted mediator is replaced by a verifiable device, which carriesout computation in public while maintaining privacy.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 55: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 56: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 57: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 58: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 59: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 60: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 14 / 47

Games of incomplete information

• Each player has type ti selected from a publicly knowndistribution of types T .

• Mediator M takes as input the types ti of the players. Outputs asample from the strategy profile.

• Canonical strategy: Send type to mediator and follow therecommended action.

• Players may send wrong types or not send types at all. M musthave sampling strategies for ti ∈ Ti∪ ⊥.

• Extended Games: ‘Cheap talk’ phase preceding the game whenplayers can communicate in some model. Then the original gameis played.

• We need an equilibrium concept for games where players mightcollude.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 61: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 15 / 47

Computational Nash Equilibrium

• All communication and computation in the extended game to bedone in poly(λ).

• Cheap talk phase modulo a hard cryptographic problem.

Definition

A computational nash equilibrium is set of strategies (x1, x2, · · · , xn)each one efficiently computable such that ui(xi, x−i) ≥ ui(x∗i , x−i)− εfor all players i and efficient alternative strategies x∗i .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 62: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 15 / 47

Computational Nash Equilibrium

• All communication and computation in the extended game to bedone in poly(λ).

• Cheap talk phase modulo a hard cryptographic problem.

Definition

A computational nash equilibrium is set of strategies (x1, x2, · · · , xn)each one efficiently computable such that ui(xi, x−i) ≥ ui(x∗i , x−i)− εfor all players i and efficient alternative strategies x∗i .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 63: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 15 / 47

Computational Nash Equilibrium

• All communication and computation in the extended game to bedone in poly(λ).

• Cheap talk phase modulo a hard cryptographic problem.

Definition

A computational nash equilibrium is set of strategies (x1, x2, · · · , xn)each one efficiently computable such that ui(xi, x−i) ≥ ui(x∗i , x−i)− εfor all players i and efficient alternative strategies x∗i .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 64: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 65: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 66: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 67: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 68: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 69: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 16 / 47

k-resilient equilibria

• Definition

A distribution D over strategies such that ∀C ⊂ [n], |C| ≤ k we haveEx∼D|xC

[ui(xC , x−C)] ≥ Ex∼D|xC[ui(xC∗, x−C)] for all players i ∈ C

and for all alternative strategies x∗C .

• Deviation not beneficial for even one player out of k.

• Ex ante: (Before the event) Collusion before M sends outstrategies.

• Interim: The colluding players can see xC and then decidealternative strategies.

• Ex ante weaker than interim.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 70: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 71: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 72: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 73: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 74: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 75: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 17 / 47

MPC to remove mediator

• Theorem

If x is a k-resilient CE for a game specified by function f , and π is aMPC protocol (output delivery) secure against upto k parties, thenrunning π in the preamble yields a k-resilient CE for the extendedgame with the same payoffs as x.

• k-resilient equilibrium is a ‘strong’ equilibrium concept. Resultalso valid for realizing weaker equilibria.

• Fair MPC: If it terminates, it is the same as output delivery.Assume that deviating party can be detected.

• The deviating parties in each run are thrown out and the protocolcontinues without them.

• With a correct and private MPC, if k = 1 other players candecide to punish the deviating player. No solution for k > 1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 76: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 18 / 47

Directions

Other Equilibrium concepts

NE for extended games allows empty threats. Equilibrium conceptssuch as sub game perfect equilibria or sequential equilibria need to beformally defined in the computational setting relevant forcryptographic protocols.

Collusion free protocols

Secure cryptographic protocols must use randomness, and this leads tothe possibility of steganography. LMS show how to realize protocolseliminating the possibility of steganography during execution, usingenvelopes and broadcast channels. Simulation of ex-ante equilibria?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 77: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Correlated Equilibria 18 / 47

Directions

Other Equilibrium concepts

NE for extended games allows empty threats. Equilibrium conceptssuch as sub game perfect equilibria or sequential equilibria need to beformally defined in the computational setting relevant forcryptographic protocols.

Collusion free protocols

Secure cryptographic protocols must use randomness, and this leads tothe possibility of steganography. LMS show how to realize protocolseliminating the possibility of steganography during execution, usingenvelopes and broadcast channels. Simulation of ex-ante equilibria?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 78: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 79: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 80: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 81: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 82: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 83: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 19 / 47

Perfect Implementation

• Game: Players, strategies, payoffs.

• Mechanism: Actions, the way actions lead to payoffs.

• Implementing a Vickrey auction:

• Players hand bids to M who computes in private and revealsoutcome. Complete trust and complete privacy.

• Players hand bids to M who makes the bids public. No trust andno privacy.

• Want a verifiable mediator providing complete privacy!

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 84: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 85: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 86: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞

• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 87: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 88: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 89: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 90: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 20 / 47

Imperfect Implementations

• M : Mechanism with trusted mediator.

• Implementation M′

has an equilibrium corresponding to everyequilibrium of M .

9, 6 −∞ −∞ −∞−∞ 6, 9 −∞ −∞−∞ −∞ 4,4 1,5

−∞ −∞ 5,1 −∞• This is a correlated equilibrium. Explain.

• Implementation: Player 1 puts the five strategies into envelopes,shuffles and player 2 chooses.

• The two players can come to an agreement so that only the firsttwo strategies get chosen.

• Against the interests of the society! Will not happen with themediator.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 91: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 92: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 93: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 94: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 95: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 96: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 21 / 47

Imperfect Implementations

• There is a bijection between the equilibria of M′

and theequilibria of M .

• Example: Four player, two strategy game.

• Payoffs: (a, a, a, a) = (0, 1, 0, 1), (b, b, b, b) = (1, 0, 1, 0),(a, b, a, b) = (10, 10,−100,−100), −∞ for all other strategies.The CE?

• Implementation: A and B flip a coin. Send outcome to C and D.

• A and B control the game!

• We require that the information available to a subset of players ina run of M

′is the same as the information available in a run of

M .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 97: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 22 / 47

Properties of a perfect implementation

• The mediator is verifiable.

• Strategic Equivalence: For all players i there is a bijection φibetween strategies in M and M

′such that

ui(m1,m2, · · · ,mn) = ui(φ1(m1), φ2(m2), · · · , φn(mn)).

• Privacy Equivalence: For all subsets of players and any strategyprofile m = (m1,m2, · · · ,mn) the information available whileplaying m in M equals the information available while playingφ(m) in M

′.

• Strategic equivalence ensures that all properties pertaining toequilibria are preserved while privacy equivalence ensures nosubset of the players has any extra advantage.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 98: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 22 / 47

Properties of a perfect implementation

• The mediator is verifiable.

• Strategic Equivalence: For all players i there is a bijection φibetween strategies in M and M

′such that

ui(m1,m2, · · · ,mn) = ui(φ1(m1), φ2(m2), · · · , φn(mn)).

• Privacy Equivalence: For all subsets of players and any strategyprofile m = (m1,m2, · · · ,mn) the information available whileplaying m in M equals the information available while playingφ(m) in M

′.

• Strategic equivalence ensures that all properties pertaining toequilibria are preserved while privacy equivalence ensures nosubset of the players has any extra advantage.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 99: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 22 / 47

Properties of a perfect implementation

• The mediator is verifiable.

• Strategic Equivalence: For all players i there is a bijection φibetween strategies in M and M

′such that

ui(m1,m2, · · · ,mn) = ui(φ1(m1), φ2(m2), · · · , φn(mn)).

• Privacy Equivalence: For all subsets of players and any strategyprofile m = (m1,m2, · · · ,mn) the information available whileplaying m in M equals the information available while playingφ(m) in M

′.

• Strategic equivalence ensures that all properties pertaining toequilibria are preserved while privacy equivalence ensures nosubset of the players has any extra advantage.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 100: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 22 / 47

Properties of a perfect implementation

• The mediator is verifiable.

• Strategic Equivalence: For all players i there is a bijection φibetween strategies in M and M

′such that

ui(m1,m2, · · · ,mn) = ui(φ1(m1), φ2(m2), · · · , φn(mn)).

• Privacy Equivalence: For all subsets of players and any strategyprofile m = (m1,m2, · · · ,mn) the information available whileplaying m in M equals the information available while playingφ(m) in M

′.

• Strategic equivalence ensures that all properties pertaining toequilibria are preserved while privacy equivalence ensures nosubset of the players has any extra advantage.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 101: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 23 / 47

Remarks

• This cannot be achieved through broadcast channels only.(Aumann-Hart)

• Envelopes and ballot boxes: Used in elections for verifiable andprivate computation of the tally function. They are universal!

• Moreover if M requires k steps of computation, the perfectimplementation will require ck steps of computation.

• Can envelopes and ballot boxes be realized by cryptographicprimitives? Can they be replaced by realizable primitives?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 102: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 23 / 47

Remarks

• This cannot be achieved through broadcast channels only.(Aumann-Hart)

• Envelopes and ballot boxes: Used in elections for verifiable andprivate computation of the tally function. They are universal!

• Moreover if M requires k steps of computation, the perfectimplementation will require ck steps of computation.

• Can envelopes and ballot boxes be realized by cryptographicprimitives? Can they be replaced by realizable primitives?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 103: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 23 / 47

Remarks

• This cannot be achieved through broadcast channels only.(Aumann-Hart)

• Envelopes and ballot boxes: Used in elections for verifiable andprivate computation of the tally function. They are universal!

• Moreover if M requires k steps of computation, the perfectimplementation will require ck steps of computation.

• Can envelopes and ballot boxes be realized by cryptographicprimitives? Can they be replaced by realizable primitives?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 104: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 23 / 47

Remarks

• This cannot be achieved through broadcast channels only.(Aumann-Hart)

• Envelopes and ballot boxes: Used in elections for verifiable andprivate computation of the tally function. They are universal!

• Moreover if M requires k steps of computation, the perfectimplementation will require ck steps of computation.

• Can envelopes and ballot boxes be realized by cryptographicprimitives? Can they be replaced by realizable primitives?

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 105: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 106: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 107: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 108: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 109: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 110: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 111: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 24 / 47

Operations on Envelopes

• Publicly create an envelope E with content c.

• Publicly open an envelope E to reveal c.

• Publicly create a super-envelope containing envelopesE1, E2, · · · , En.

• Publicly open super-envelope.

• Ballot box envelopes E1, E2, · · · , En to obtain randomlypermuted envelopes E

′1, E

′2, · · · , E

′n.

• Destroy ballots publicly.

• n = 5 will be sufficient for universal computation.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 112: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 25 / 47

Verifiable mediator and computer

• Input: Sequence of ballots S, public record s.

• Output: Next operation to be performed on the ballots.

• Verifiable computation of g : Xn → Y on disjoint ballotsS1, S2, · · · , Sn encoding the inputs xi guarantees:

• Privacy: Each public record is an element from S5 chosenuniformly at random.

• Correctness: The content of the final sequence of ballots isg(x1, x2, · · · , xn).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 113: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 25 / 47

Verifiable mediator and computer

• Input: Sequence of ballots S, public record s.

• Output: Next operation to be performed on the ballots.

• Verifiable computation of g : Xn → Y on disjoint ballotsS1, S2, · · · , Sn encoding the inputs xi guarantees:

• Privacy: Each public record is an element from S5 chosenuniformly at random.

• Correctness: The content of the final sequence of ballots isg(x1, x2, · · · , xn).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 114: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 25 / 47

Verifiable mediator and computer

• Input: Sequence of ballots S, public record s.

• Output: Next operation to be performed on the ballots.

• Verifiable computation of g : Xn → Y on disjoint ballotsS1, S2, · · · , Sn encoding the inputs xi guarantees:

• Privacy: Each public record is an element from S5 chosenuniformly at random.

• Correctness: The content of the final sequence of ballots isg(x1, x2, · · · , xn).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 115: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 25 / 47

Verifiable mediator and computer

• Input: Sequence of ballots S, public record s.

• Output: Next operation to be performed on the ballots.

• Verifiable computation of g : Xn → Y on disjoint ballotsS1, S2, · · · , Sn encoding the inputs xi guarantees:

• Privacy: Each public record is an element from S5 chosenuniformly at random.

• Correctness: The content of the final sequence of ballots isg(x1, x2, · · · , xn).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 116: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 25 / 47

Verifiable mediator and computer

• Input: Sequence of ballots S, public record s.

• Output: Next operation to be performed on the ballots.

• Verifiable computation of g : Xn → Y on disjoint ballotsS1, S2, · · · , Sn encoding the inputs xi guarantees:

• Privacy: Each public record is an element from S5 chosenuniformly at random.

• Correctness: The content of the final sequence of ballots isg(x1, x2, · · · , xn).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 117: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 118: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 119: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 120: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 121: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 122: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 26 / 47

Universal Computation with Ballots

• Permutation Inverse

• Input: Envelopes A1, A2, · · · , A5 containing permutation σ.

• Output: Envelopes B1, B2, · · · , B5 containing σ−1.

• Publicly make B = I and pack (A,B) = (σ, I) into fivesuper-envelopes.

• Ballot box to get (τσ, τ). Open the envelopes A to reveal τσpublicly.

• (τσ)−1 ◦ τ = σ−1.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 123: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 124: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 125: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 126: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 127: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 128: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 129: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 27 / 47

Universal Computation with Ballots

• Permutation Product

• Input: Envelopes A,B containing σ, τ .

• Output: Envelopes containing στ .

• Obtain envelopes D containing σ−1 by previous algorithm.

• Pack (D,B) = (σ−1, τ) into five super-envelopes.

• Ballot box to get (ρσ−1, ρτ). Open B to reveal ρσ−1 publicly.

• (ρσ−1)−1 ◦ ρτ = στ .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 130: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 131: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 132: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 133: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 134: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 135: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 136: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 28 / 47

Universal Computation with Ballots

• Permutation Clone

• Input: Envelopes A containing σ.

• Output: Envelopes B,C containing σ.

• Publicly create B,C = I. Obtain envelopes D containing σ−1.

• Pack (D,B,C) = (σ−1, I, I) into five super-envelopes.

• Ballot box to get (τσ−1, τ, τ). Open A to reveal τσ−1 publicly.

• (τσ−1)−1 ◦ τ = σ.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 137: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 138: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 139: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435

• And(a,b)=13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 140: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 141: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 142: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 143: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 29 / 47

Universal Computation over S5

• Magic! Barrington

• 0 = 12345, 1 = 12453.

• Not(a)= 12354 ◦ a ◦ 12435• And(a,b)=

13245 ◦ a ◦ 34125 ◦ b ◦ 34125 ◦ a−1 ◦ 34125 ◦ b−1 ◦ 24135.

• Fanout: Use clone.

• Randomness: Create two envelopes with contents 0 and 1. Ballotbox and destroy one of them.

• This is a universal set of primitives.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 144: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 30 / 47

Perfect Implementation

• Encode strategies, types as S5 bits.

• Execute a verifiable ballot computer on these inputs.

• Open the final results publicly.

• Strategy equivalence: Obvious payoff preserving bijection.

• Privacy equivalence: All that is revealed in an execution is asequence of random permutations.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 145: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 30 / 47

Perfect Implementation

• Encode strategies, types as S5 bits.

• Execute a verifiable ballot computer on these inputs.

• Open the final results publicly.

• Strategy equivalence: Obvious payoff preserving bijection.

• Privacy equivalence: All that is revealed in an execution is asequence of random permutations.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 146: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 30 / 47

Perfect Implementation

• Encode strategies, types as S5 bits.

• Execute a verifiable ballot computer on these inputs.

• Open the final results publicly.

• Strategy equivalence: Obvious payoff preserving bijection.

• Privacy equivalence: All that is revealed in an execution is asequence of random permutations.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 147: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 30 / 47

Perfect Implementation

• Encode strategies, types as S5 bits.

• Execute a verifiable ballot computer on these inputs.

• Open the final results publicly.

• Strategy equivalence: Obvious payoff preserving bijection.

• Privacy equivalence: All that is revealed in an execution is asequence of random permutations.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 148: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 30 / 47

Perfect Implementation

• Encode strategies, types as S5 bits.

• Execute a verifiable ballot computer on these inputs.

• Open the final results publicly.

• Strategy equivalence: Obvious payoff preserving bijection.

• Privacy equivalence: All that is revealed in an execution is asequence of random permutations.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 149: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 31 / 47

Privately Aborting Strategies

• Problem: To verify that the input A sent by a player is a validencoding of a bit.

• Execute algorithm for A−1. A is a permutation iff. the publicrecord (τ.σ for a random τ) is a permutation.

• Create two copies B,C of A. Apply Not to C.

• Pack B and C into one super-envelope each and ballot box thesuper-envelopes.

• Open one of the super-envelopes. This should be a valid encodingof a bit but does not reveal any information.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 150: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 31 / 47

Privately Aborting Strategies

• Problem: To verify that the input A sent by a player is a validencoding of a bit.

• Execute algorithm for A−1. A is a permutation iff. the publicrecord (τ.σ for a random τ) is a permutation.

• Create two copies B,C of A. Apply Not to C.

• Pack B and C into one super-envelope each and ballot box thesuper-envelopes.

• Open one of the super-envelopes. This should be a valid encodingof a bit but does not reveal any information.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 151: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 31 / 47

Privately Aborting Strategies

• Problem: To verify that the input A sent by a player is a validencoding of a bit.

• Execute algorithm for A−1. A is a permutation iff. the publicrecord (τ.σ for a random τ) is a permutation.

• Create two copies B,C of A. Apply Not to C.

• Pack B and C into one super-envelope each and ballot box thesuper-envelopes.

• Open one of the super-envelopes. This should be a valid encodingof a bit but does not reveal any information.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 152: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 31 / 47

Privately Aborting Strategies

• Problem: To verify that the input A sent by a player is a validencoding of a bit.

• Execute algorithm for A−1. A is a permutation iff. the publicrecord (τ.σ for a random τ) is a permutation.

• Create two copies B,C of A. Apply Not to C.

• Pack B and C into one super-envelope each and ballot box thesuper-envelopes.

• Open one of the super-envelopes. This should be a valid encodingof a bit but does not reveal any information.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 153: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Perfect Implementation 31 / 47

Privately Aborting Strategies

• Problem: To verify that the input A sent by a player is a validencoding of a bit.

• Execute algorithm for A−1. A is a permutation iff. the publicrecord (τ.σ for a random τ) is a permutation.

• Create two copies B,C of A. Apply Not to C.

• Pack B and C into one super-envelope each and ballot box thesuper-envelopes.

• Open one of the super-envelopes. This should be a valid encodingof a bit but does not reveal any information.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 154: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 32 / 47

MPC with rational players

• Cryptography assumes that all players are honest/malicious.

• What happens when the MPC players are rational instead?

• Payoffs: Correctness, Exclusivity, Privacy, Voyeurism.

• Let us first consider correctness > exclusivity model.

• Loss of correctness outweighs gain due to exclusivity.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 155: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 32 / 47

MPC with rational players

• Cryptography assumes that all players are honest/malicious.

• What happens when the MPC players are rational instead?

• Payoffs: Correctness, Exclusivity, Privacy, Voyeurism.

• Let us first consider correctness > exclusivity model.

• Loss of correctness outweighs gain due to exclusivity.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 156: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 32 / 47

MPC with rational players

• Cryptography assumes that all players are honest/malicious.

• What happens when the MPC players are rational instead?

• Payoffs: Correctness, Exclusivity, Privacy, Voyeurism.

• Let us first consider correctness > exclusivity model.

• Loss of correctness outweighs gain due to exclusivity.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 157: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 32 / 47

MPC with rational players

• Cryptography assumes that all players are honest/malicious.

• What happens when the MPC players are rational instead?

• Payoffs: Correctness, Exclusivity, Privacy, Voyeurism.

• Let us first consider correctness > exclusivity model.

• Loss of correctness outweighs gain due to exclusivity.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 158: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 32 / 47

MPC with rational players

• Cryptography assumes that all players are honest/malicious.

• What happens when the MPC players are rational instead?

• Payoffs: Correctness, Exclusivity, Privacy, Voyeurism.

• Let us first consider correctness > exclusivity model.

• Loss of correctness outweighs gain due to exclusivity.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 159: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 33 / 47

Function Evaluation Game

• Canonical Strategy: Send inputs to mediator, mediator sendsanswer.

• Payoffs: a for correctness, a+ b for exclusivity, 0 otherwise.

• Question: Is the canonical strategy a correlated equilibrium?

• A function is Non Cooperatively Computable (NCC) if thecanonical strategy is a correlated equilibrium.

• In the player’s interests to report correct values.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 160: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 33 / 47

Function Evaluation Game

• Canonical Strategy: Send inputs to mediator, mediator sendsanswer.

• Payoffs: a for correctness, a+ b for exclusivity, 0 otherwise.

• Question: Is the canonical strategy a correlated equilibrium?

• A function is Non Cooperatively Computable (NCC) if thecanonical strategy is a correlated equilibrium.

• In the player’s interests to report correct values.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 161: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 33 / 47

Function Evaluation Game

• Canonical Strategy: Send inputs to mediator, mediator sendsanswer.

• Payoffs: a for correctness, a+ b for exclusivity, 0 otherwise.

• Question: Is the canonical strategy a correlated equilibrium?

• A function is Non Cooperatively Computable (NCC) if thecanonical strategy is a correlated equilibrium.

• In the player’s interests to report correct values.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 162: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 33 / 47

Function Evaluation Game

• Canonical Strategy: Send inputs to mediator, mediator sendsanswer.

• Payoffs: a for correctness, a+ b for exclusivity, 0 otherwise.

• Question: Is the canonical strategy a correlated equilibrium?

• A function is Non Cooperatively Computable (NCC) if thecanonical strategy is a correlated equilibrium.

• In the player’s interests to report correct values.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 163: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 33 / 47

Function Evaluation Game

• Canonical Strategy: Send inputs to mediator, mediator sendsanswer.

• Payoffs: a for correctness, a+ b for exclusivity, 0 otherwise.

• Question: Is the canonical strategy a correlated equilibrium?

• A function is Non Cooperatively Computable (NCC) if thecanonical strategy is a correlated equilibrium.

• In the player’s interests to report correct values.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 164: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 165: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 166: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 167: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 168: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 169: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Rationalizing MPC 34 / 47

Function that are not NCC

• Dominated: OR function, value fixed by input of some player.

• Reversible: Parity function, player can flip value and still manageto compute the function.

Theorem

A function is NCC if and only if it is not dominated or reversible.

• k −NCC: Canonical strategy a k-resilient CE.

• OPEN: Rationalizing computation of non NCC functions.

• If the function is k −NCC then the MPC protocolimplementing it can be made rational.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 170: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 35 / 47

Problem Overview

• The classical problem of t-out-of-n secret sharing involves a“dealer” D who wishes to entrust a secret s to a group of nplayers P1, ..., Pn so that

1 any group of t or more players can reconstruct the secret withoutfurther intervention of the dealer.

2 any group of fewer than t players has no information about thesecret.

• Equivalently, at least t players are honest but up to n− t playersmay be arbitrarily malicious.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 171: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 35 / 47

Problem Overview

• The classical problem of t-out-of-n secret sharing involves a“dealer” D who wishes to entrust a secret s to a group of nplayers P1, ..., Pn so that

1 any group of t or more players can reconstruct the secret withoutfurther intervention of the dealer.

2 any group of fewer than t players has no information about thesecret.

• Equivalently, at least t players are honest but up to n− t playersmay be arbitrarily malicious.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 172: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 35 / 47

Problem Overview

• The classical problem of t-out-of-n secret sharing involves a“dealer” D who wishes to entrust a secret s to a group of nplayers P1, ..., Pn so that

1 any group of t or more players can reconstruct the secret withoutfurther intervention of the dealer.

2 any group of fewer than t players has no information about thesecret.

• Equivalently, at least t players are honest but up to n− t playersmay be arbitrarily malicious.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 173: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 36 / 47

Shamir’s Scheme

• Assume that secret s lies in a finite field F, with |F| > n.

• The dealer chooses a random polynomial f(x) of degree at mostt− 1 subject to the constraint f(0) = s, and gives the “share”f(i) to player Pi (for i = 1, ..., n).

• Any set of t players can recover f(x) (and hence s) bybroadcasting their shares and interpolating the polynomial.

• No set of fewer than t players can deduce any information about s.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 174: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 36 / 47

Shamir’s Scheme

• Assume that secret s lies in a finite field F, with |F| > n.

• The dealer chooses a random polynomial f(x) of degree at mostt− 1 subject to the constraint f(0) = s, and gives the “share”f(i) to player Pi (for i = 1, ..., n).

• Any set of t players can recover f(x) (and hence s) bybroadcasting their shares and interpolating the polynomial.

• No set of fewer than t players can deduce any information about s.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 175: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 36 / 47

Shamir’s Scheme

• Assume that secret s lies in a finite field F, with |F| > n.

• The dealer chooses a random polynomial f(x) of degree at mostt− 1 subject to the constraint f(0) = s, and gives the “share”f(i) to player Pi (for i = 1, ..., n).

• Any set of t players can recover f(x) (and hence s) bybroadcasting their shares and interpolating the polynomial.

• No set of fewer than t players can deduce any information about s.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 176: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 36 / 47

Shamir’s Scheme

• Assume that secret s lies in a finite field F, with |F| > n.

• The dealer chooses a random polynomial f(x) of degree at mostt− 1 subject to the constraint f(0) = s, and gives the “share”f(i) to player Pi (for i = 1, ..., n).

• Any set of t players can recover f(x) (and hence s) bybroadcasting their shares and interpolating the polynomial.

• No set of fewer than t players can deduce any information about s.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 177: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 36 / 47

Shamir’s Scheme

• Assume that secret s lies in a finite field F, with |F| > n.

• The dealer chooses a random polynomial f(x) of degree at mostt− 1 subject to the constraint f(0) = s, and gives the “share”f(i) to player Pi (for i = 1, ..., n).

• Any set of t players can recover f(x) (and hence s) bybroadcasting their shares and interpolating the polynomial.

• No set of fewer than t players can deduce any information about s.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 178: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 179: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 180: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 181: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 182: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 183: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 37 / 47

Problem Statement - Halpern and Teague

• Players are neither completely honest nor arbitrarily malicious, butinstead they are assumed to be rational.

• Depending on the utility functions of the players, Shamir’sprotocol may no longer succeed in this scenario.

• Assume that all players prefer to learn the secret above all else,but otherwise prefer that the fewest number of other players learnthe secret. Consider player P1:

• If strictly fewer than t− 1 other players reveal their shares to therest of the group, then no one learns the secret regardless ofwhether player P1 reveals his share or not.

• If more than t− 1 players reveal their shares, then everyone learnsthe secret and P1’s action again have no effect.

• If exactly t− 1 other players reveal their shares, then P1 learns thesecret (using his share) but P1 can prevent other players fromlearning the secret by not publicly revealing his share.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 184: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 185: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 186: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 187: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 188: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 189: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 190: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 38 / 47

Definitions for Rational Sharing

• At the beginning of each iteration, D distributes some information(privately) to each of the n players.

• During an iteration, the dealer does not take part in the protocol.

• Instead, some set of t∗ ≥ t players, all of whom are assumed to berational, run the protocol amongst themselves by simultaneouslybroadcasting messages in a series of rounds.

• There is no private communication between the players.

• We assume that the same set of t∗ players runs the protocol inevery iteration.

• The dealer is honest and follows the protocol as specified.

• If t∗ ≥ t players follow the protocol in each iteration, then thesecret is eventually reconstructed.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 191: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 39 / 47

Definitions for Rational Sharing

• Let σi denote the strategy employed by player Pi, and letσ = (σ1, ..., σn) denote the vector of players’ strategies.

• Let (σ′i, σ−i) , (σ1, ..., σi−1, σ′i, σi+1, ..., σn).

• Let ui(o) denote the utility of player Pi for the outcome o.

• Let δi(o) be a bit denoting whether or not Pi learns the secret,and let num(o) =

∑i δi(o) be the number of players who learn

the secret.

• Utility functions of the players should satisfy:

1 δi(o) > δi(o′)⇒ ui(o) > ui(o′).2 If δi(o) = δi(o′), then num(o) < num(o′)⇒ ui(o) > ui(o′).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 192: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 39 / 47

Definitions for Rational Sharing

• Let σi denote the strategy employed by player Pi, and letσ = (σ1, ..., σn) denote the vector of players’ strategies.

• Let (σ′i, σ−i) , (σ1, ..., σi−1, σ′i, σi+1, ..., σn).

• Let ui(o) denote the utility of player Pi for the outcome o.

• Let δi(o) be a bit denoting whether or not Pi learns the secret,and let num(o) =

∑i δi(o) be the number of players who learn

the secret.

• Utility functions of the players should satisfy:

1 δi(o) > δi(o′)⇒ ui(o) > ui(o′).2 If δi(o) = δi(o′), then num(o) < num(o′)⇒ ui(o) > ui(o′).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 193: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 39 / 47

Definitions for Rational Sharing

• Let σi denote the strategy employed by player Pi, and letσ = (σ1, ..., σn) denote the vector of players’ strategies.

• Let (σ′i, σ−i) , (σ1, ..., σi−1, σ′i, σi+1, ..., σn).

• Let ui(o) denote the utility of player Pi for the outcome o.

• Let δi(o) be a bit denoting whether or not Pi learns the secret,and let num(o) =

∑i δi(o) be the number of players who learn

the secret.

• Utility functions of the players should satisfy:

1 δi(o) > δi(o′)⇒ ui(o) > ui(o′).2 If δi(o) = δi(o′), then num(o) < num(o′)⇒ ui(o) > ui(o′).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 194: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 39 / 47

Definitions for Rational Sharing

• Let σi denote the strategy employed by player Pi, and letσ = (σ1, ..., σn) denote the vector of players’ strategies.

• Let (σ′i, σ−i) , (σ1, ..., σi−1, σ′i, σi+1, ..., σn).

• Let ui(o) denote the utility of player Pi for the outcome o.

• Let δi(o) be a bit denoting whether or not Pi learns the secret,and let num(o) =

∑i δi(o) be the number of players who learn

the secret.

• Utility functions of the players should satisfy:

1 δi(o) > δi(o′)⇒ ui(o) > ui(o′).2 If δi(o) = δi(o′), then num(o) < num(o′)⇒ ui(o) > ui(o′).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 195: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 39 / 47

Definitions for Rational Sharing

• Let σi denote the strategy employed by player Pi, and letσ = (σ1, ..., σn) denote the vector of players’ strategies.

• Let (σ′i, σ−i) , (σ1, ..., σi−1, σ′i, σi+1, ..., σn).

• Let ui(o) denote the utility of player Pi for the outcome o.

• Let δi(o) be a bit denoting whether or not Pi learns the secret,and let num(o) =

∑i δi(o) be the number of players who learn

the secret.

• Utility functions of the players should satisfy:

1 δi(o) > δi(o′)⇒ ui(o) > ui(o′).2 If δi(o) = δi(o′), then num(o) < num(o′)⇒ ui(o) > ui(o′).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 196: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 40 / 47

Definitions for Rational Sharing

Definition-weakly dominated strategy

Let Si denote a set of strategies for Pi and letSi , S1 × · · · × Si−1 × Si+1 · · ·Sn. A strategy σi ∈ Si is weaklydominated by a strategy σ′i ∈ Si with respect to Si if

1 there exists a σ−i ∈ S−i such that Ui(σi, σ−i) < Ui(σ′i, σ−i).

2 for all σ−i ∈ S−i, it holds that Ui(σi, σ−i) ≤ Ui(σ′i, σ−i).

Definition

Strategy σi is weakly dominated with respect to S−i if there exists aσ′i ∈ Si such that σi is weakly dominated by σ′i with respect to S−i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 197: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 40 / 47

Definitions for Rational Sharing

Definition-weakly dominated strategy

Let Si denote a set of strategies for Pi and letSi , S1 × · · · × Si−1 × Si+1 · · ·Sn. A strategy σi ∈ Si is weaklydominated by a strategy σ′i ∈ Si with respect to Si if

1 there exists a σ−i ∈ S−i such that Ui(σi, σ−i) < Ui(σ′i, σ−i).

2 for all σ−i ∈ S−i, it holds that Ui(σi, σ−i) ≤ Ui(σ′i, σ−i).

Definition

Strategy σi is weakly dominated with respect to S−i if there exists aσ′i ∈ Si such that σi is weakly dominated by σ′i with respect to S−i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 198: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 41 / 47

Example-Weakly dominated strategy

• A secret is shared using t-out-of-n secret sharing (t < n)

• The strategy vector is such that all n players reveal their secret.

• This is a Nash equilibrium: the secret is reconstructed even if anysingle player deviates.

• For each player Pi, revealing the share is weakly dominated by notrevealing the share:

1 If fewer than t− 1 players or more than t− 1 other players revealtheir shares, then nothing changes.

2 If exactly t− 1 other players reveal their shares then Pi learns thesecret but no one else does.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 199: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 41 / 47

Example-Weakly dominated strategy

• A secret is shared using t-out-of-n secret sharing (t < n)• The strategy vector is such that all n players reveal their secret.

• This is a Nash equilibrium: the secret is reconstructed even if anysingle player deviates.

• For each player Pi, revealing the share is weakly dominated by notrevealing the share:

1 If fewer than t− 1 players or more than t− 1 other players revealtheir shares, then nothing changes.

2 If exactly t− 1 other players reveal their shares then Pi learns thesecret but no one else does.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 200: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 41 / 47

Example-Weakly dominated strategy

• A secret is shared using t-out-of-n secret sharing (t < n)• The strategy vector is such that all n players reveal their secret.

• This is a Nash equilibrium: the secret is reconstructed even if anysingle player deviates.

• For each player Pi, revealing the share is weakly dominated by notrevealing the share:

1 If fewer than t− 1 players or more than t− 1 other players revealtheir shares, then nothing changes.

2 If exactly t− 1 other players reveal their shares then Pi learns thesecret but no one else does.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 201: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 41 / 47

Example-Weakly dominated strategy

• A secret is shared using t-out-of-n secret sharing (t < n)• The strategy vector is such that all n players reveal their secret.

• This is a Nash equilibrium: the secret is reconstructed even if anysingle player deviates.

• For each player Pi, revealing the share is weakly dominated by notrevealing the share:

1 If fewer than t− 1 players or more than t− 1 other players revealtheir shares, then nothing changes.

2 If exactly t− 1 other players reveal their shares then Pi learns thesecret but no one else does.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 202: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 42 / 47

Shamir’s scheme - game-theoretic equilibria

• For any t, n, t∗, it is a Nash equilibrium for no one to reveal theirshare.

• If t∗ > t, it is a Nash equilibrium for all t∗ participating players toreveal their shares. But, it is a weakly dominating strategy foreach player not to reveal his share.

• If t = t∗, then having all participating players players reveal theirshares is not even a Nash equilibrium, since each player canprofitably deviate by not revealing his share.

Shamir’s protocol with the trivial reconstruction procedure does notsuffice in the presence of rational players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 203: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 42 / 47

Shamir’s scheme - game-theoretic equilibria

• For any t, n, t∗, it is a Nash equilibrium for no one to reveal theirshare.

• If t∗ > t, it is a Nash equilibrium for all t∗ participating players toreveal their shares. But, it is a weakly dominating strategy foreach player not to reveal his share.

• If t = t∗, then having all participating players players reveal theirshares is not even a Nash equilibrium, since each player canprofitably deviate by not revealing his share.

Shamir’s protocol with the trivial reconstruction procedure does notsuffice in the presence of rational players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 204: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 42 / 47

Shamir’s scheme - game-theoretic equilibria

• For any t, n, t∗, it is a Nash equilibrium for no one to reveal theirshare.

• If t∗ > t, it is a Nash equilibrium for all t∗ participating players toreveal their shares. But, it is a weakly dominating strategy foreach player not to reveal his share.

• If t = t∗, then having all participating players players reveal theirshares is not even a Nash equilibrium, since each player canprofitably deviate by not revealing his share.

Shamir’s protocol with the trivial reconstruction procedure does notsuffice in the presence of rational players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 205: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 42 / 47

Shamir’s scheme - game-theoretic equilibria

• For any t, n, t∗, it is a Nash equilibrium for no one to reveal theirshare.

• If t∗ > t, it is a Nash equilibrium for all t∗ participating players toreveal their shares. But, it is a weakly dominating strategy foreach player not to reveal his share.

• If t = t∗, then having all participating players players reveal theirshares is not even a Nash equilibrium, since each player canprofitably deviate by not revealing his share.

Shamir’s protocol with the trivial reconstruction procedure does notsuffice in the presence of rational players.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 206: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 43 / 47

Definitions for Rational Sharing

Definition

Let DOMi(S1 × · · · × Sn) denote the set of strategies in Si that areweakly dominated with respect to S−i. Let S0

i denote the initial set ofallowable strategies of Pi. For all k ≥ 1, define Ski inductively asSki , Sk−1

i \ DOMi(Sk−11 × · · · × Sk−1

n ). Let S∞i ,⋂k S

ki .

We say σi survives iterated deletion of weakly dominated strategies ifσi ∈ S∞i .

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 207: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 208: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 209: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 210: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 211: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 212: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 44 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• The dealer holds a secret s which lies in a strict subset S of afinite field F.

• Players know S.

• At the beginning of each iteration• with probability β the dealer generates a random Shamir

sharing of s• with probability 1− β the dealer generates a random Shamir

sharing of an arbitrary element s ∈ F \ S.

• During an iteration, the players broadcast their shares.

• If in any iteration some player does not broadcast his share, theother players all refuse to participate in all subsequent iterations.

• Otherwise, all shares are broadcast and the players canreconstruct some value s′.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 213: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 45 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• If s′ ∈ S then the players know that this is the true secret, andcan terminate the protocol.

• If s′ ∈ F \ S, the players know this is an invalid secret and proceedto the next iteration.

Theorem

For appropriate choice of β, the protocol constitutes a Nashequilibrium for t-out-of-n secret sharing that survives iterated deletionof weakly dominated strategies.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 214: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 45 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• If s′ ∈ S then the players know that this is the true secret, andcan terminate the protocol.

• If s′ ∈ F \ S, the players know this is an invalid secret and proceedto the next iteration.

Theorem

For appropriate choice of β, the protocol constitutes a Nashequilibrium for t-out-of-n secret sharing that survives iterated deletionof weakly dominated strategies.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 215: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 45 / 47

Secret sharing protocol-S. D. Gordon and J. Katz

• If s′ ∈ S then the players know that this is the true secret, andcan terminate the protocol.

• If s′ ∈ F \ S, the players know this is an invalid secret and proceedto the next iteration.

Theorem

For appropriate choice of β, the protocol constitutes a Nashequilibrium for t-out-of-n secret sharing that survives iterated deletionof weakly dominated strategies.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 216: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 46 / 47

Removing the Dealer

Setup:

• To share a secret s, the dealer prepares a valid t-out-of-n Shamirsharing {si} of s.

• The dealer generates a signature σi on each share si with respectto a publicly-known verification key PK.

• The dealer sends (si, σi) to player Pi.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 217: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 46 / 47

Removing the Dealer

Setup:

• To share a secret s, the dealer prepares a valid t-out-of-n Shamirsharing {si} of s.

• The dealer generates a signature σi on each share si with respectto a publicly-known verification key PK.

• The dealer sends (si, σi) to player Pi.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 218: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 46 / 47

Removing the Dealer

Setup:

• To share a secret s, the dealer prepares a valid t-out-of-n Shamirsharing {si} of s.

• The dealer generates a signature σi on each share si with respectto a publicly-known verification key PK.

• The dealer sends (si, σi) to player Pi.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 219: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.• The functionality checks that each σi is a valid signature on si,

and aborts if this is not the case.• The t∗ ≥ t shares define a secret s.• With probability β, the functionality generates a fresh t-out-of-n

Shamir sharing {s′i} of s, and each player receives output s′i.• With probability 1− β, the functionality generates a fresh

t-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 220: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.

• The functionality checks that each σi is a valid signature on si,and aborts if this is not the case.

• The t∗ ≥ t shares define a secret s.• With probability β, the functionality generates a fresh t-out-of-n

Shamir sharing {s′i} of s, and each player receives output s′i.• With probability 1− β, the functionality generates a fresh

t-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 221: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.• The functionality checks that each σi is a valid signature on si,

and aborts if this is not the case.

• The t∗ ≥ t shares define a secret s.• With probability β, the functionality generates a fresh t-out-of-n

Shamir sharing {s′i} of s, and each player receives output s′i.• With probability 1− β, the functionality generates a fresh

t-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 222: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.• The functionality checks that each σi is a valid signature on si,

and aborts if this is not the case.• The t∗ ≥ t shares define a secret s.

• With probability β, the functionality generates a fresh t-out-of-nShamir sharing {s′i} of s, and each player receives output s′i.

• With probability 1− β, the functionality generates a fresht-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 223: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.• The functionality checks that each σi is a valid signature on si,

and aborts if this is not the case.• The t∗ ≥ t shares define a secret s.• With probability β, the functionality generates a fresh t-out-of-n

Shamir sharing {s′i} of s, and each player receives output s′i.

• With probability 1− β, the functionality generates a fresht-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 224: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 47 / 47

Removing the Dealer

Protocol:

At the beginning of each iteration, the players proceed as follows:

1 The t∗ participating parties run the protocol that computes thefollowing probabilistic functionality:

• Each party inputs the values (si, σi) received from the dealer.• The functionality checks that each σi is a valid signature on si,

and aborts if this is not the case.• The t∗ ≥ t shares define a secret s.• With probability β, the functionality generates a fresh t-out-of-n

Shamir sharing {s′i} of s, and each player receives output s′i.• With probability 1− β, the functionality generates a fresh

t-out-of-n Shamir sharing {s′i} of a bogus secret s ∈ F \ S, andeach player Pi receives output s′i.

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 225: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 48 / 47

Removing the Dealer

Protocol:

2 If cheating is detected in the protocol, then parties terminate theoverall protocol without ever reconstructing the secret.

3 Each player Pi broadcasts the output s′i they received from theprotocol applied in the stage (1)

• If this enables reconstruction of a secret s ∈ S, the protocolterminates and the true secret has been reconstructed.

• If some player refused to broadcast their output share, then partiesterminate the protocol without reconstructing the secret.

• In any other case, players erase the {s′i} and proceed to the nextiteration (using (si, σi) as before).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 226: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 48 / 47

Removing the Dealer

Protocol:

2 If cheating is detected in the protocol, then parties terminate theoverall protocol without ever reconstructing the secret.

3 Each player Pi broadcasts the output s′i they received from theprotocol applied in the stage (1)

• If this enables reconstruction of a secret s ∈ S, the protocolterminates and the true secret has been reconstructed.

• If some player refused to broadcast their output share, then partiesterminate the protocol without reconstructing the secret.

• In any other case, players erase the {s′i} and proceed to the nextiteration (using (si, σi) as before).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 227: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 48 / 47

Removing the Dealer

Protocol:

2 If cheating is detected in the protocol, then parties terminate theoverall protocol without ever reconstructing the secret.

3 Each player Pi broadcasts the output s′i they received from theprotocol applied in the stage (1)

• If this enables reconstruction of a secret s ∈ S, the protocolterminates and the true secret has been reconstructed.

• If some player refused to broadcast their output share, then partiesterminate the protocol without reconstructing the secret.

• In any other case, players erase the {s′i} and proceed to the nextiteration (using (si, σi) as before).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal

Page 228: Game Theory and Cryptography - Peoplechristos/agt09/crypto.pdf · Game Theory and Cryptography 1 / 47 Game Theory and Cryptography Nebojsa Milosavljevic, Anupam Prakash Department

Game Theory and Cryptography > Game Theoretic Influence on Cryptography 48 / 47

Removing the Dealer

Protocol:

2 If cheating is detected in the protocol, then parties terminate theoverall protocol without ever reconstructing the secret.

3 Each player Pi broadcasts the output s′i they received from theprotocol applied in the stage (1)

• If this enables reconstruction of a secret s ∈ S, the protocolterminates and the true secret has been reconstructed.

• If some player refused to broadcast their output share, then partiesterminate the protocol without reconstructing the secret.

• In any other case, players erase the {s′i} and proceed to the nextiteration (using (si, σi) as before).

UC Berkeley Nebojsa Milosavljevic, Anupam PrakashUCBseal