Rational secret sharing as extensive games

The threat that comes from previously used punishment strategies in rational secret sharing is weakened because the punishment somtimes also causes loss to the punisher himself. In this paper, we first model 2-out-of-2 rational secret sharing in an extensive game with imperfect information, and then provide a strategy for achieving secret recovery in this game. Moreover, we prove that the strategy is a sequential equilibrium which means after any history of the game no player can benefit from deviations so long as the other players stick to the strategy. In particular, when a deviation is detected, the punishment executed by the punisher is still his optimal option. Therefor, by considering rational secret sharing as an extensive game, we design punishment strategies that effectively punish the deviants and meanwhile guarantee punishers’ benefit. Hence, these punishments are more credible than previous ones. Except assuming the existence of simultaneous channels, our scheme can have dealer off-line and extend to the t-out-of-n setting, and also satisfies computational equilibria in some sense.

[1]  Moni Naor,et al.  Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.

[2]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[3]  Jonathan Katz,et al.  Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.

[4]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[5]  T. Rabin,et al.  Algorithmic Game Theory: Cryptography and Game Theory , 2007 .

[6]  David C. Parkes,et al.  Fairness with an Honest Minority and a Rational Majority , 2009, TCC.

[7]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[8]  Tal Rabin,et al.  1 Cryptography and Game Theory , 2022 .

[9]  Moni Naor,et al.  Games for exchanging information , 2008, STOC.

[10]  Anna Lysyanskaya,et al.  Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.

[11]  C. Pandu Rangan,et al.  Rational Secret Sharing with Repeated Games , 2008, ISPEC.

[12]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[13]  Jonathan Katz,et al.  Rational Secret Sharing, Revisited , 2006, SCN.

[14]  Oded Goldreich,et al.  Foundations of Cryptography: List of Figures , 2001 .

[15]  Yehuda Lindell,et al.  Complete Fairness in Secure Two-Party Computation , 2011, JACM.

[16]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[17]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[18]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[19]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[20]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[21]  Georg Fuchsbauer,et al.  Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..

[22]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[23]  Danny Dolev,et al.  Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.