Example: multi-party coin toss

Slides:



Advertisements
Similar presentations
Fair Computation with Rational Players Adam Groce and Jonathan Katz University of Maryland.
Advertisements

Coin Tossing With A Man In The Middle Boaz Barak.
Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
NON - zero sum games.
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Arbitration. Introduction In this section we will consider the impact of outside arbitration on coordination games Specifically, we will consider two.
Game Theory Assignment For all of these games, P1 chooses between the columns, and P2 chooses between the rows.
Introduction to Game theory Presented by: George Fortetsanakis.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
 1. Introduction to game theory and its solutions.  2. Relate Cryptography with game theory problem by introducing an example.  3. Open questions and.
Computational Security. Overview Goal: Obtain computational security against an active adversary. Hope: under a reasonable cryptographic assumption, obtain.
Achieving Byzantine Agreement and Broadcast against Rational Adversaries Adam Groce Aishwarya Thiruvengadam Ateeq Sharfuddin CMSC 858F: Algorithmic Game.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Short course on quantum computing Andris Ambainis University of Latvia.
Ecs289m Spring, 2008 Non-cooperative Games S. Felix Wu Computer Science Department University of California, Davis
GAME THEORY By Ben Cutting & Rohit Venkat. Game Theory: General Definition  Mathematical decision making tool  Used to analyze a competitive situation.
Slide 1 of 13 So... What’s Game Theory? Game theory refers to a branch of applied math that deals with the strategic interactions between various ‘agents’,
Oblivious Transfer based on the McEliece Assumptions
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
AWESOME: A General Multiagent Learning Algorithm that Converges in Self- Play and Learns a Best Response Against Stationary Opponents Vincent Conitzer.
APEC 8205: Applied Game Theory Fall 2007
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Games in the normal form- An application: “An Economic Theory of Democracy” Carl Henrik Knutsen 5/
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Law and Economics-Charles W. Upton Why Property Rights.
The Agencies Method for Coalition Formation in Experimental Games John Nash (University of Princeton) Rosemarie Nagel (Universitat Pompeu Fabra, ICREA,
How to play ANY mental game
Public-Key Encryption with Lazy Parties Kenji Yasunaga Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Japan Presented at SCN.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Secure Computation (Lecture 2) Arpita Patra. Vishwaroop of MPC.
Lecture 12. Game theory So far we discussed: roulette and blackjack Roulette: – Outcomes completely independent and random – Very little strategy (even.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
Utility Dependence in Correct and Fair Rational Secret Sharing Gilad Asharov Yehuda Lindell Bar-Ilan University, Israel.
Negotiating Socially Optimal Allocations of Resources U. Endriss, N. Maudet, F. Sadri, and F. Toni Presented by: Marcus Shea.
A Game-Theoretic Perspective on Oblivious Transfer Kenji Yasunaga (ISIT) Joint work with Haruna Higo, Akihiro Yamada, Keisuke Tanaka (Tokyo Inst. of Tech.)
Day 9 GAME THEORY. 3 Solution Methods for Non-Zero Sum Games Dominant Strategy Iterated Dominant Strategy Nash Equilibrium NON- ZERO SUM GAMES HOW TO.
Dynamic Weighted Voting Games Edith Elkind Dmitrii Pasechnik Yair Zick AAMAS 2013.
Computing Shapley values, manipulating value division schemes, and checking core membership in multi-issue domains Vincent Conitzer, Tuomas Sandholm Computer.
Game Theory By Ben Cutting & Rohit Venkat.
Mixed Strategies Keep ‘em guessing.
Contents of the Talk Preliminary Materials Motivation and Contribution
Adversary Models in the context of crypto protocols modeling
Topic 36: Zero-Knowledge Proofs
The Exact Round Complexity of Secure Computation
Chapter 15: Game Theory: The Mathematics Lesson Plan of Competition
The Duality Theorem Primal P: Maximize
C. Kiekintveld et al., AAMAS 2009 (USC) Presented by Neal Gupta
Rational Choice Sociology
Foundations of Secure Computation
Modern symmetric-key Encryption
Extensive-form games and how to solve them
Wstęp do Teorii Gier.
THE ECONOMY: THE CORE PROJECT
Competition in Persuasion
Multiagent Systems Game Theory © Manfred Huber 2018.
RS – Reed Solomon List Decoding.
LECTURE 6: MULTIAGENT INTERACTIONS
Chapter 29 Game Theory Key Concept: Nash equilibrium and Subgame Perfect Nash equilibrium (SPNE)
Multiagent Systems Repeated Games © Manfred Huber 2018.
Chapter 14 & 15 Repeated Games.
Evolving cooperation in one-time interactions with strangers
Chapter 14 & 15 Repeated Games.
Chapter 15: Game Theory: The Mathematics Lesson Plan of Competition
GAMES AND STRATEGIES.
GAMES AND STRATEGIES.
Game Theory: The Nash Equilibrium
Definition of Renegotiation-safe
Normal Form (Matrix) Games
Blockchain Mining Games
Presentation transcript:

Example: multi-party coin toss P1, P2 and P3 are playing a game: each of them outputs a random bit(0 or 1), then the final outcome is the XOR of the three bits. P1 prefers the outcome to be 0, and P2, P3 prefer 1. The players who can guess the right outcome could get a payoff of 1. otherwise, losers get nothing from this game. Notice: if they all prefer the same number, the outcome will be the globally preferred number.

What is multi-party coin toss In a game played by n parties(honest or corrupt), each party wants to get 0 or 1. Preference profile: each party has a preference. The vector of all parties’ preference, denoted Coin-toss protocol: a protocol is a system of interactions between players. Those n parties can jointly decide an outcome of the protocol between 0 and1. Outcome of the protocol: Payoff: Winners(prefer the outcome) can get a payoff of 1, and losers get 0.

Strong Fairness and Weak Fairness Strong Fairness: A corrupt party can’t bias the outcome. e.g. the outcome of 0 or 1 are still both be [½ -negl(k), ½ + negl(k)]. k is the security parameter of the protocol. Weak Fairness: A corrupt party can bias the outcome of the remaining honest party, but the bias must not be in the corrupt party’s favor. e.g. If the corrupt party prefers 0, then the Pr(outcome=1) is at least ½-negl(k).

However, Strong Fairness is too strong to satisfy, now, we are trying to extend the notion of weak fairness.

Here comes. Maximin Fairness. Cooperative-Strategy-Proof Fairness Here comes Maximin Fairness Cooperative-Strategy-Proof Fairness Strong Nash Equilibrium

Maximin Fairness Maximin fairness requires that no honest party should be harmed by any corrupt coalition. In other words, a corrupt coalition should not be able to (non-negligibly) decrease the expected payoff for any honest party relative to an all-honest execution. In an execution, with an adversary, the expected reward for any honest party is at least 1 −negl(κ).

Cooperative-strategy-proof Fairness Cooperative-strategy-proof (CSP) fairness requires that no deviation by a corrupt coalition of size up to n − 1 can noticeably improve the coalition’s total expected reward relative to an honest execution. It is not difficult to see that CSP fairness is equivalent to maximin fairness for zero- sum cases: when exactly half prefer 0 and half prefer 1. However, the two notions are incomparable in general.

Strong Nash Equilibrium SNE fairness requires that no deviation by a coalition can improve every coalition member’s expected reward. SNE fairness is strictly weaker than CSP fairness in general.

Nash Equilibrium Two or more players in which each player is assumed to know the equilibrium strategies of the other players, and no player has anything to gain by changing only their own strategy.

Corruption Model

Maximin Fairness Unanimous preference profile: all players prefer 0 or 1. Almost unanimous preference profile: everyone agrees in preference except one party. Amply divided preference profile: there are at least 2 0-supporters and at least 2 1- supporters.

Maximin Fairness: the case for amply divided P

Maximin Fairness: the case for almost unanimous P Fail-stop adversaries Possibility of maximin fairness for fail-stop adversaries

Maximin Fairness: the case for almost unanimous P Malicious adversaries Impossibility of maximin fairness for malicious adversaries, even under computational assumptions.