Adversarial Leakage in Games

While the minimax (or maximin) strategy has become the standard and most agreed-upon solution for decision making in adversarial settings, as discussed in game theory, computer science, and other disciplines, its power arises from the use of mixed strategies, also known as probabilistic algorithms. Nevertheless, in adversarial settings we face the risk of information leakage about the actual strategy instantiation. Hence, real robust algorithms should take information leakage into account. In this paper we introduce the notion of adversarial leakage in games, namely, the ability of a player to learn the value of $b$ binary predicates about the strategy instantiation of her opponent. Different leakage models are suggested and tight bounds on the effect of adversarial leakage as a function of the level of leakage (captured by $b$) are established. The complexity of computing optimal strategies under these adversarial leakage models is also addressed. Together, our study introduces a new framework for robust...

[1]  Moshe Tennenholtz,et al.  Competitive Safety Analysis: Robust Decision-Making in Multi-Agent Systems , 2002, J. Artif. Intell. Res..

[2]  Noga Alon,et al.  Algorithms with large domination ratio , 2004, J. Algorithms.

[3]  H. Simon,et al.  A Behavioral Model of Rational Choice , 1955 .

[4]  Hedieh Nasheri Economic Espionage and Industrial Spying: Contents , 2004 .

[5]  Joseph Y. Halpern,et al.  Algorithmic rationality: adding cost of computation to game theory , 2011, SECO.

[6]  A. Matsui Information Leakage Forces Cooperation , 1989 .

[7]  Noga Alon,et al.  The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.

[8]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  R. Aumann,et al.  Some Thoughts on the Minimax Principle , 1972 .

[11]  Omer Reingold,et al.  Partial exposure in large games , 2010, Games Econ. Behav..

[12]  Noga Alon,et al.  Simple construction of almost k-wise independent random variables , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[13]  E. Kalai Large Robust Games , 2004 .

[14]  N. Alon Tools from higher algebra , 1996 .

[15]  Lance Fortnow,et al.  Repeated matching pennies with limited randomness , 2011, EC '11.

[16]  J. Scott Provan,et al.  The Use of Spies in Strategic Situations: Preliminary Report , 2008 .

[17]  A. Rubinstein Finite automata play the repeated prisoner's dilemma , 1986 .

[18]  Moshe Tennenholtz,et al.  Program equilibrium , 2004, Games Econ. Behav..

[19]  Noga Alon,et al.  The Probabilistic Method, Third Edition , 2008, Wiley-Interscience series in discrete mathematics and optimization.

[20]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[21]  R. Aumann On the Non-transferable Utility Value: A Comment on the Roth-Shafer Examples [Values for Games without Side Payments: Some Difficulties with Current Concepts] [On the Existence and Interpretation of Value Allocations] , 1985 .

[22]  A. Weil Sur les courbes algébriques et les variétés qui s'en déduisent , 1948 .

[23]  Leeat Yariv,et al.  Games with espionage , 2004, Games Econ. Behav..

[24]  László Lovász,et al.  On the ratio of optimal integral and fractional covers , 1975, Discret. Math..

[25]  Moni Naor,et al.  Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.

[26]  David S. Johnson,et al.  Approximation algorithms for combinatorial problems , 1973, STOC.