Rationality and Adversarial Behavior in Multy-Party Computation
نویسندگان
چکیده
In this paper, we study multi-party computation in the model where none of the participating parties are honest: they are either rational, acting in their selfish interest to maximize their utility, or adversarial, acting arbitrarily. In this new model, which we call the mixed-behavior model, we define a class of functions that can be correctly computed in the presence of an adversary using a trusted mediator. We then give a protocol that allows the rational parties to to emulate the mediator and jointly compute a function such that (1) assuming that each rational party prefers that it learns the output while others do not, no rational party will have an incentive to deviate from the protocol; and (2) the rational parties are protected from the malicious adversary controlling a minority of the participants in the following sense: if the adversary controls up to dn 2 e − 2 of n participants, then the adversary can only either cause all rational participants to abort (so no one learns the function they are trying to compute), or can only learn whatever information about their inputs is implied by the output of the function. We also present a slightly modified protocol that achieves a different trade-off between the above properties; where namely, adversarial abort can be tolerated if rational parties’ desired behavior is appropriately relaxed.
منابع مشابه
Rationality and Adversarial Behavior in Multi-party Computation
We study multi-party computation in the model where none of n participating parties are honest: they are either rational, acting in their selfish interest to maximize their utility, or adversarial, acting arbitrarily. In this new model, which we call the mixed-behavior model, we define a class of functions that can be computed in the presence of an adversary using a trusted mediator. We then gi...
متن کاملSTUDIES ON FAULT - TOLERANT BROADCAST AND SECURE COMPUTATION Chiu Yuen Koo Doctor
Title of dissertation: STUDIES ON FAULT-TOLERANT BROADCAST AND SECURE COMPUTATION Chiu Yuen Koo Doctor of Philosophy, 2007 Dissertation directed by: Professor Jonathan Katz Department of Computer Science In this dissertation, we consider the design of broadcast and secure multi-party computation (MPC) protocols in the presence of adversarial faults. Secure multi-party computation is the most ge...
متن کاملStudies on Fault-tolerant Broadcast and Secure Computation
Title of dissertation: STUDIES ON FAULT-TOLERANT BROADCAST AND SECURE COMPUTATION Chiu Yuen Koo Doctor of Philosophy, 2007 Dissertation directed by: Professor Jonathan Katz Department of Computer Science In this dissertation, we consider the design of broadcast and secure multi-party computation (MPC) protocols in the presence of adversarial faults. Secure multi-party computation is the most ge...
متن کاملSecure Two-Party Computation Is Practical
Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few implementations with which to test various ideas. This has led to a number of optimisations being proposed which are quite restricted in their application. In this paper we describe an implementation of the two-party case, using ...
متن کاملLegally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that the properties privacy, correctness, independence of inputs, fairness and guaranteed output delivery should all be preserved. Unfortunately, in the case of no honest majori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006