Lower Bounds on Implementing Robust and Resilient Mediators

We provide new and tight lower bounds on the ability of players to implement equilibria using cheap talk, that is, just allowing communication among the players. One of our main results is that, in general, it is impossible to implement three-player Nash equilibria in a bounded number of rounds. We also give the first rigorous connection between Byzantine agreement lower bounds and lower bounds on implementation. To this end we consider a number of variants of Byzantine agreement and introduce reduction arguments. We also give lower bounds on the running time of two player implementations. All our results extended to lower bounds on (k, t)-robust equilibria, a solution concept that tolerates deviations by coalitions of size up to k and deviations by up to t players with unknown utilities (who may be malicious).

[1]  Birgit Pfitzmann,et al.  Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .

[2]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[3]  José E. Vila,et al.  Computational complexity and communication: Coordination in two-player games , 2002 .

[4]  Imre Bárány,et al.  Fair Distribution Protocols or How the Players Replace Fortune , 1992, Math. Oper. Res..

[5]  A. Urbano,et al.  Computationally restricted unmediated talk under incomplete information , 2004 .

[6]  Abhi Shelat,et al.  Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.

[7]  J. Wooders,et al.  Coalition-Proof Equilibrium , 1996 .

[8]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[9]  F. Forges Published by: The , 2022 .

[10]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[11]  Leslie Lamport,et al.  The Weak Byzantine Generals Problem , 1983, JACM.

[12]  Sergei Izmalkov,et al.  Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[13]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[14]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[15]  Moni Naor,et al.  Timed Commitments , 2000, CRYPTO.

[16]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[17]  J. Sobel,et al.  STRATEGIC INFORMATION TRANSMISSION , 1982 .

[18]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[19]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[20]  Shai Halevi,et al.  A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.

[21]  Yuval Heller,et al.  A Minority-Proof Cheap-Talk Protocol , 2008, Games Econ. Behav..

[22]  J. K. Vrijling,et al.  Abstract , 2001, Veterinary Record.

[23]  Ray L. Birdwhistell,et al.  An Approach to Communication , 1962 .

[24]  R. Aumann Correlated Equilibrium as an Expression of Bayesian Rationality Author ( s ) , 1987 .

[25]  S. Hart,et al.  Long Cheap Talk , 2003 .

[26]  Matthias Fitzi,et al.  Two-Threshold Broadcast and Detectable Multi-party Computation , 2003, EUROCRYPT.

[27]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[28]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[29]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[30]  Bayesian Rationality,et al.  CORRELATED EQUILIBRIUM AS AN EXPRESSION OF , 1987 .

[31]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[32]  K. Eliaz Fault Tolerant Implementation , 2002 .

[33]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[34]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[35]  Robert J. Aumann,et al.  16. Acceptable Points in General Cooperative n-Person Games , 1959 .

[36]  R. Selten Reexamination of the perfectness concept for equilibrium points in extensive games , 1975, Classics in Game Theory.

[37]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[38]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[39]  Abhi Shelat,et al.  Collusion-free protocols , 2005, STOC '05.

[40]  Elchanan Ben-Porath,et al.  Cheap talk in games with incomplete information , 2003, J. Econ. Theory.

[41]  Andrew Chi-Chih Yao,et al.  Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.

[42]  Philip Wolfe,et al.  Contributions to the theory of games , 1953 .

[43]  Nancy A. Lynch,et al.  Easy impossibility proofs for distributed consensus problems , 1985, PODC '85.

[44]  M. Whinston,et al.  Coalition-Proof Nash Equilibria I. Concepts , 1987 .

[45]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .