Social rational secure multi‐party computation

Rational party is a new kind of parties who behave neither like honest parties nor like malicious adversaries. The crux point of rational party is the definition of the utility function, as rational parties only care about how to maximize their utility. In other words, rational parties choose the strategies, which can bring them the highest utilities. In rational secure two‐party computation protocol, the main task is how to boost mutual cooperation to complete the protocol. Social rational secure multi‐party computation (SRSMPC) means that in a social network, some distributed and rational parties with reputation properties want to jointly compute a functionality. The seemingly simple task becomes tough under three conditions. The first condition is that the network composed by parties may not be complete. That is, two parties may not be neighbors and they are connected through other parties. The second is that the network may be not secure. That is, messages may be tempered by malicious parties. The third condition is that parties may run the protocol under incomplete information scenario. That is, parties may have types and each type has a corresponding utility function. Under the first and second conditions, parties need to consider how to securely transmit messages between two parties who are not neighbors. Under the third condition, we propose the Tit‐for‐Tat strategy and prove that mutual cooperation is a sequential equilibrium between two parties. In this paper, we construct an SRSMPC protocol by using mechanism design under incomplete information to facilitate the implementation of the SRSMPC protocol within constant rounds. Meanwhile, newcomers are allowed to participate in the protocol. To the best of our knowledge, this is the first social rational secure computation protocol for multi‐party under an incomplete information scenario and an incomplete network. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[2]  Georg Fuchsbauer,et al.  Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..

[3]  Abhi Shelat,et al.  Collusion-free protocols , 2005, STOC '05.

[4]  Elchanan Ben-Porath,et al.  Cheap talk in games with incomplete information , 2003, J. Econ. Theory.

[5]  Ueli Maurer,et al.  Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.

[6]  John H. Miller,et al.  Rational Cooperation in the Finitely Repeated Prisoner's Dilemma: Experimental Evidence , 1993 .

[7]  Tal Rabin,et al.  Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.

[8]  Ueli Maurer,et al.  Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.

[9]  A. Urbano,et al.  Computationally restricted unmediated talk under incomplete information , 2004 .

[10]  David M. Kreps,et al.  Rational cooperation in the finitely repeated prisoners' dilemma , 1982 .

[11]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[12]  Paul R. Milgrom,et al.  Predation, reputation, and entry deterrence☆ , 1982 .

[13]  Mehrdad Nojoumian Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory , 2011, IACR Cryptol. ePrint Arch..

[14]  Jonathan Katz,et al.  Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.

[15]  Florian Kerschbaum,et al.  Parallelizing secure linear programming , 2009, NSS 2009.

[16]  Matthew K. Franklin,et al.  Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.

[17]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[18]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[19]  Abhi Shelat,et al.  Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.

[20]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[21]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[22]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[23]  Shai Halevi,et al.  A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.

[24]  Abhi Shelat,et al.  Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.

[25]  Ran Canetti,et al.  Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.

[26]  Florian Kerschbaum,et al.  Parallelizing secure linear programming , 2009, Concurr. Comput. Pract. Exp..

[27]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[28]  Yehuda Lindell,et al.  Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, CRYPTO.

[29]  Jonathan Katz,et al.  Fair Computation with Rational Players , 2012, EUROCRYPT.

[30]  Akira Okada Perfect Bayesian Equilibrium and Sequential Equilibrium , 2011 .

[31]  José E. Vila,et al.  Computational complexity and communication: Coordination in two-player games , 2002 .

[32]  Radu State,et al.  Breaking Tor Anonymity with Game Theory and Data Mining , 2010, 2010 Fourth International Conference on Network and System Security.

[33]  Timothy Lethbridge,et al.  A New Approach for the Trust Calculation in Social Networks , 2006, ICE-B.

[34]  Munindar P. Singh,et al.  An adaptive social network for information access: Theoretical and experimental results , 2003, Appl. Artif. Intell..

[35]  C. Pandu Rangan,et al.  Rational Secret Sharing with Repeated Games , 2008, ISPEC.

[36]  Moni Naor,et al.  Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.

[37]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[38]  Douglas R. Stinson,et al.  Socio-Rational Secret Sharing as a New Direction in Rational Cryptography , 2012, GameSec.

[39]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.

[40]  Douglas R. Stinson,et al.  Unconditionally secure social secret sharing scheme , 2010, IET Inf. Secur..

[41]  Moni Naor,et al.  Games for exchanging information , 2008, STOC.

[42]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[43]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[44]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.