Rational Proofs with Non-Cooperative Provers

Interactive-proof-based approaches are widely used in verifiable computation outsourcing. The verifier models a computationally-constrained client and the provers model powerful service providers. In classical interactive-proof models with multiple provers, the provers' interests either perfectly align (e.g. MIP) or directly conflict (e.g. refereed games). However, service providers participating in outsourcing applications may not meet such extremes. Instead, each provider may be paid for his service, while he acts solely in his own best interest. An active research area in this context is rational interactive proofs (RIP), in which the provers try to maximize their payment. However, existing works consider either a single prover, or multiple provers who cooperate to maximize their total payment. None of them truly capture the strategic nature of multiple service providers. How to define and design non-cooperative rational interactive proofs is a well-known open problem. We introduce a multi-prover interactive-proof model in which the provers are rational and non-cooperative. That is, each prover acts individually so as to maximize his own payment in the resulting game. This model generalizes single-prover rational interactive proofs as well as cooperative multi-prover rational proofs. This new model better reflects the strategic nature of service providers from a game-theoretic viewpoint. To design and analyze non-cooperative rational interactive proofs (ncRIP), we define a new solution concept for extensive-form games with imperfect information, strong sequential equilibrium. Our technical results focus on protocols which give strong guarantees on utility gap, which is analogous to soundness gap in classical interactive proofs. We give tight characterizations of the class of ncRIP protocols with constant, noticeable, and negligible gap.

[1]  Bogdan Carbunar,et al.  Fair Payments for Outsourced Computations , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[2]  Ron Rothblum,et al.  Non-interactive proofs of proximity , 2015, computational complexity.

[3]  Andrew J. Blumberg,et al.  Verifiable computation using multiple provers , 2014, IACR Cryptol. ePrint Arch..

[4]  Joan Feigenbaum,et al.  A game-theoretic classification of interactive complexity classes , 1995, Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference.

[5]  Harry Buhrman,et al.  Quantum bounded query complexity , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).

[6]  Hannu Vartiainen,et al.  Subgame perfect implementation of voting rules via randomized mechanisms , 2007, Soc. Choice Welf..

[7]  László Babai,et al.  Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..

[8]  Lilly Irani,et al.  Amazon Mechanical Turk , 2018, Advances in Intelligent Systems and Computing.

[9]  Silvio Micali,et al.  Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.

[10]  Carsten Lund,et al.  Algebraic methods for interactive proof systems , 1992, JACM.

[11]  D. Koller,et al.  The complexity of two-person zero-sum games in extensive form , 1992 .

[12]  U. Feige,et al.  Making Games Short , 2006 .

[13]  R. Beigel,et al.  Bounded Queries to SAT and the Boolean Hierarchy , 1991, Theor. Comput. Sci..

[14]  Bogdan Carbunar,et al.  Payments for Outsourced Computations , 2012, IEEE Transactions on Parallel and Distributed Systems.

[15]  Benjamin Braun,et al.  Verifying computations with state , 2013, IACR Cryptol. ePrint Arch..

[16]  Silvio Micali,et al.  Rational proofs , 2012, STOC '12.

[17]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[18]  Yael Tauman Kalai,et al.  Arguments of Proximity - [Extended Abstract] , 2015, CRYPTO.

[19]  David M. Kreps,et al.  A Course in Microeconomic Theory , 2020 .

[20]  Graham Cormode,et al.  Practical verified computation with streaming interactive proofs , 2011, ITCS '12.

[21]  A. Raftery,et al.  Strictly Proper Scoring Rules, Prediction, and Estimation , 2007 .

[22]  Jin Li,et al.  Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Srinath T. V. Setty,et al.  A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.

[24]  Benjamin Braun,et al.  Resolving the conflict between generality and plausibility in verified computation , 2013, EuroSys '13.

[25]  Suresh Venkatasubramanian,et al.  Streaming Verification in Data Analysis , 2015, ISAAC.

[26]  Benjamin Braun,et al.  Taking Proof-Based Verified Computation a Few Steps Closer to Practicality , 2012, USENIX Security Symposium.

[27]  Hanspeter Pfister,et al.  Verifiable Computation with Massively Parallel Interactive Proofs , 2012, HotCloud.

[28]  G. Brier VERIFICATION OF FORECASTS EXPRESSED IN TERMS OF PROBABILITY , 1950 .

[29]  Uriel Feige On the success probability of the two provers in one-round proof systems , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[30]  Sanjeev Arora How NP got a new definition: a survey of probabilistically checkable proofs , 2003, ArXiv.

[31]  Motty Perry,et al.  Virtual Implementation in Backwards Induction , 1996 .

[32]  Srinath T. V. Setty,et al.  Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.

[33]  Avi Wigderson,et al.  Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.

[34]  Ran Canetti,et al.  Refereed delegation of computation , 2013, Inf. Comput..

[35]  Adi Shamir,et al.  IP = PSPACE , 1992, JACM.

[36]  László Lovász,et al.  Two-prover one-round proof systems: their power and their problems (extended abstract) , 1992, STOC '92.

[37]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[38]  Ryszard Kowalczyk,et al.  Truthful Market-Based Trading of Cloud Services with Reservation Price , 2014, 2014 IEEE International Conference on Services Computing.

[39]  John Duggan An extensive form solution to the adverse selection problem in principal/multi-agent environments , 1998 .

[40]  John H. Reif,et al.  The Complexity of Two-Player Games of Incomplete Information , 1984, J. Comput. Syst. Sci..

[41]  Sanjeev Arora,et al.  Probabilistic checking of proofs; a new characterization of NP , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[42]  Moshe Tennenholtz,et al.  The Noisy Oracle Problem , 1988, CRYPTO.

[43]  Nicola Gatti,et al.  New results on the verification of Nash refinements for extensive-form games , 2012, AAMAS.

[44]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.

[45]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[46]  Ran Canetti,et al.  Practical delegation of computation using multiple servers , 2011, CCS '11.

[47]  R. Cramer,et al.  Linear Zero-Knowledgde. A Note on Efficient Zero-Knowledge Proofs and Arguments , 1996 .

[48]  Kristoffer Arnsfelt Hansen,et al.  The Computational Complexity of Trembling Hand Perfection and Other Equilibrium Refinements , 2010, SAGT.

[49]  S. Pfeifer A Course In Microeconomic Theory , 2016 .

[50]  Carsten Lund,et al.  Non-deterministic exponential time has two-prover interactive protocols , 2005, computational complexity.

[51]  Alon Rosen,et al.  Rational arguments: single round delegation with sublinear verification , 2014, ITCS.

[52]  Subhash Khot,et al.  Query Efficient PCPs with Perfect Completeness , 2005, Theory Comput..

[53]  Klaus W. Wagner,et al.  Bounded Query Classes , 1990, SIAM J. Comput..

[54]  Carsten Lund,et al.  Proof verification and the hardness of approximation problems , 1998, JACM.

[55]  Yael Tauman Kalai,et al.  Delegating computation: interactive proofs for muggles , 2008, STOC.

[56]  Shikha Singh,et al.  Rational Proofs with Multiple Provers , 2015, ITCS.

[57]  Justin Thaler,et al.  Time-Optimal Interactive Proofs for Circuit Evaluation , 2013, CRYPTO.

[58]  H. J. Jacobsen,et al.  The One-Shot-Deviation Principle for Sequential Rationality , 1996 .

[59]  Lance Fortnow,et al.  On the Power of Multi-Prover Interactive Protocols , 1994, Theor. Comput. Sci..

[60]  Pablo Azar,et al.  Super-efficient rational proofs , 2013, EC '13.

[61]  Shafi Goldwasser,et al.  Private coins versus public coins in interactive proof systems , 1986, STOC '86.

[62]  Ran Canetti,et al.  Two Protocols for Delegation of Computation , 2012, ICITS.

[63]  Ran Canetti,et al.  Two 1-Round Protocols for Delegation of Computation , 2011, IACR Cryptol. ePrint Arch..

[64]  László Babai,et al.  Trading group theory for randomness , 1985, STOC '85.

[65]  Graham Cormode,et al.  Verifying Computations with Streaming Interactive Proofs , 2011, Proc. VLDB Endow..

[66]  Andrew J. Blumberg,et al.  Verifying computations without reexecuting them , 2015, Commun. ACM.

[67]  Lance Fortnow,et al.  Are There Interactive Protocols for CO-NP Languages? , 1988, Inf. Process. Lett..

[68]  Nir Bitansky,et al.  Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits , 2012, CRYPTO.

[69]  Ran Raz,et al.  Competing provers protocols for circuit evaluation , 2013, ITCS '13.

[70]  R. Selten Reexamination of the perfectness concept for equilibrium points in extensive games , 1975, Classics in Game Theory.

[71]  Graham Cormode,et al.  Verifiable Stream Computation and Arthur-Merlin Communication , 2019, SIAM J. Comput..

[72]  Rosario Gennaro,et al.  Sequentially Composable Rational Proofs , 2015, GameSec.

[73]  D. Boneh,et al.  Interactive proofs of proximity: delegating computation in sublinear time , 2013, STOC '13.

[74]  Suresh Venkatasubramanian,et al.  Verifiable Stream Computation and Arthur-Merlin Communication , 2015, CCC.

[75]  Yihua Zhang,et al.  Efficient Secure and Verifiable Outsourcing of Matrix Multiplications , 2014, ISC.

[76]  Alon Rosen,et al.  Rational Sumchecks , 2015, TCC.

[77]  Adi Shamir,et al.  Multi-Oracle Interactive Protocols with Constant Space Verifiers , 1992, J. Comput. Syst. Sci..

[78]  Madhu Sudan,et al.  Probabilistically checkable proofs , 2009, CACM.