Rational Multiparty Computation

Wallrabenstein, John Ross Ph.D., Purdue University, December 2014. Rational Multiparty Computation. Major Professor: Chris Clifton. The field of rational cryptography considers the design of cryptographic protocols in the presence of rational agents seeking to maximize local utility functions. This departs from the standard secure multiparty computation setting, where players are assumed to be either honest or malicious. We detail the construction of both a two-party and a multiparty game theoretic framework for constructing rational cryptographic protocols. Our framework specifies the utility function assumptions necessary to realize the privacy, correctness, and fairness guarantees for protocols. We demonstrate that our framework correctly models cryptographic protocols, such as rational secret sharing, where existing work considers equilibrium concepts that yield unreasonable equilibria. Similarly, we demonstrate that cryptography may be applied to the game theoretic domain, constructing an auction market not realizable in the original formulation. Additionally, we demonstrate that modeling players as rational agents allows us to design a protocol that destabilizes coalitions. Thus, we establish a mutual benefit from combining the two fields, while demonstrating the applicability of our framework to real-world market environments. We also give an application of game theory to adversarial interactions where cryptography is not necessary. Specifically, we consider adversarial machine learning, where the adversary is rational and reacts to the presence of a data miner. We give a general extension to classification algorithms that returns greater expected utility for the data miner than existing classification methods.

[1]  Abhi Shelat,et al.  Collusion-free protocols , 2005, STOC '05.

[2]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  William Poundstone,et al.  Prisoner's Dilemma: John Von Neumann, Game Theory and the Puzzle of the Bomb , 1992 .

[5]  Moshe Tennenholtz,et al.  Non-cooperative computation: Boolean functions with correctness and exclusivity , 2005, Theor. Comput. Sci..

[6]  Tobias Scheffer,et al.  Nash Equilibria of Static Prediction Games , 2009, NIPS.

[7]  Tansu Alpcan,et al.  Network Security , 2010 .

[8]  Mikhail J. Atallah,et al.  Efficient Correlated Action Selection , 2006, Financial Cryptography.

[9]  Zhifang Zhang,et al.  Rational secret sharing as extensive games , 2013, Science China Information Sciences.

[10]  Georg Fuchsbauer,et al.  Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..

[11]  Abhi Shelat,et al.  Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.

[12]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[13]  Prabir Bhattacharya,et al.  Game theoretic models for detecting network intrusions , 2008, Comput. Commun..

[15]  Jonathan Katz,et al.  Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.

[16]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.

[17]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[18]  Zhifang Zhang,et al.  Unconditionally Secure Rational Secret Sharing in Standard Communication Networks , 2010, ICISC.

[19]  Sergei Izmalkov,et al.  Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[20]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[21]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[22]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[23]  Chris Clifton,et al.  AC-Framework for Privacy-Preserving Collaboration , 2007, SDM.

[24]  Chris Clifton,et al.  Classifier evaluation and attribute selection against active adversaries , 2010, Data Mining and Knowledge Discovery.

[25]  Paul W. Goldberg,et al.  The Complexity of Computing a Nash Equilibrium , 2009, SIAM J. Comput..

[26]  Tobias Scheffer,et al.  Stackelberg games for adversarial prediction problems , 2011, KDD.

[27]  Rafail Ostrovsky,et al.  How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.

[28]  James E. Eaves,et al.  Walrasian Tâtonnement Auctions on the Tokyo Grain Exchange , 2007 .

[29]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[30]  Abhi Shelat,et al.  Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.

[31]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[32]  Ueli Maurer,et al.  Collusion-Preserving Computation , 2012, IACR Cryptol. ePrint Arch..

[33]  Janez Demsar,et al.  Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..

[34]  Amir Globerson,et al.  Nightmare at test time: robust learning by feature deletion , 2006, ICML.

[35]  Abhi Shelat,et al.  Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.

[36]  Nuno Vasconcelos,et al.  Risk minimization, probability elicitation, and cost-sensitive SVMs , 2010, ICML.

[37]  Jonathan Katz,et al.  Byzantine Agreement with a Rational Adversary , 2012, ICALP.

[38]  Tomas Toft,et al.  On Secure Two-Party Integer Division , 2012, Financial Cryptography.

[39]  Steven Salzberg,et al.  On Comparing Classifiers: Pitfalls to Avoid and a Recommended Approach , 1997, Data Mining and Knowledge Discovery.

[40]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[41]  Ran Canetti,et al.  Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.

[42]  Christopher Meek,et al.  Adversarial learning , 2005, KDD '05.

[43]  Fabio Roli,et al.  Adversarial Pattern Classification Using Multiple Classifiers and Randomisation , 2008, SSPR/SPR.

[44]  Eitan Zemel,et al.  Nash and correlated equilibria: Some complexity considerations , 1989 .

[45]  E. Kushilevitz Foundations of Cryptography Foundations of Cryptography , 2014 .

[46]  Christos H. Papadimitriou,et al.  On the Complexity of the Parity Argument and Other Inefficient Proofs of Existence , 1994, J. Comput. Syst. Sci..

[47]  Douglas R. Stinson,et al.  Socio-Rational Secret Sharing as a New Direction in Rational Cryptography , 2012, GameSec.

[48]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[49]  Jason D. M. Rennie ifile: An Application of Machine Learning to E-Mail Filtering , 2000 .

[50]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[51]  Blaine Nelson,et al.  Adversarial machine learning , 2019, AISec '11.

[52]  C. Pandu Rangan,et al.  Rational Secret Sharing with Repeated Games , 2008, ISPEC.

[53]  Mariana Raykova,et al.  Outsourcing Multi-Party Computation , 2011, IACR Cryptol. ePrint Arch..

[54]  Alon Rosen,et al.  Sequential Rationality in Cryptographic Protocols , 2010, FOCS.

[55]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[56]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[57]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[58]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[59]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[60]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[61]  Shai Halevi,et al.  A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.

[62]  Lin Chen,et al.  A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.

[63]  Stas Filshtinskiy Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? , 2013, CACM.

[64]  Yehuda Lindell,et al.  Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, TCC.

[65]  Sanjay Chawla,et al.  Mining adversarial patterns via regularized loss minimization , 2010, Machine Learning.

[66]  A. Urbano,et al.  Computationally restricted unmediated talk under incomplete information , 2004 .

[67]  Ran Canetti,et al.  Universally Composable Security with Local Adversaries , 2012, SCN.

[68]  Moni Naor,et al.  Games for exchanging information , 2008, STOC.

[69]  Joseph Y. Halpern,et al.  Game Theory with Costly Computation , 2008, ArXiv.

[70]  Richard Colbaugh,et al.  Predictive defense against evolving adversaries , 2012, 2012 IEEE International Conference on Intelligence and Security Informatics.

[71]  Jonathan Katz,et al.  Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.

[72]  Giacomo Bonanno,et al.  AGM-consistency and perfect Bayesian equilibrium. Part I: definition and properties , 2013, Int. J. Game Theory.

[73]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[74]  Ivan Damgård,et al.  Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..

[75]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[76]  Chris Clifton,et al.  Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market , 2014, Financial Cryptography.

[77]  Richard Cole,et al.  Fast-converging tatonnement algorithms for one-time and ongoing market problems , 2008, STOC.

[78]  Bernhard von Stengel,et al.  Extensive-Form Correlated Equilibrium: Definition and Computational Complexity , 2008, Math. Oper. Res..

[79]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[80]  Moni Naor,et al.  Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.

[81]  Chris Clifton,et al.  An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems , 2008, Manuf. Serv. Oper. Manag..

[82]  Xenofontas A. Dimitropoulos,et al.  SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.

[83]  Keith B. Frikken,et al.  PBS: Private Bartering Systems , 2008, Financial Cryptography.

[84]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[85]  Peter Bro Miltersen,et al.  Privacy-enhancing auctions using rational cryptography , 2009, BQGT.

[86]  Jonathan Katz,et al.  Fair Computation with Rational Players , 2012, EUROCRYPT.

[87]  Pedro M. Domingos,et al.  Adversarial classification , 2004, KDD.