eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2010/448

Sequential Rationality in Cryptographic Protocols

Ronen Gradwohl, Noam Livne, and Alon Rosen

Abstract

Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the asymptotic nature of cryptographic security, a definition of sequential rationality for this setting has thus far eluded researchers. We propose a new framework for overcoming these obstacles, and provide the first definitions of computational solution concepts that guarantee sequential rationality. We argue that natural computational variants of subgame perfection are too strong for cryptographic protocols. As an alternative, we introduce a weakening called threat free Nash equilibrium that is more permissive but still eliminates the undesirable ``empty threats'' of non-sequential solution concepts. To demonstrate the applicability of our framework, we revisit the problem of implementing a mediator for correlated equilibria (Dodis Halevi-Rabin, Crypto'00), and propose a variant of their protocol that is sequentially rational for a non-trivial class of correlated equilibria. Our treatment provides a better understanding of the conditions under which mediators in a correlated equilibrium can be replaced by a stable protocol.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
alon rosen @ idc ac il
History
2010-08-18: received
Short URL
https://ia.cr/2010/448
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/448,
      author = {Ronen Gradwohl and Noam Livne and Alon Rosen},
      title = {Sequential Rationality in Cryptographic Protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2010/448},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/448}},
      url = {https://eprint.iacr.org/2010/448}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.