SlideShare a Scribd company logo
1 of 38
Download to read offline
Distributed Computing Meets Game Theory
Robust Mechanisms for Secret Sharing and Implementation
with Cheap Talk
Joe Halpern
Cornell University
Joint work with Ittai Abraham, Danny Dolev, Rica Gonen
1 / 22
Two Views of the World
Work on distributed computing and on cryptography has assumed
agents are either “good” or “bad”
good agents follow the protocol
bad agents do all they can to subvert it
2 / 22
Two Views of the World
Work on distributed computing and on cryptography has assumed
agents are either “good” or “bad”
good agents follow the protocol
bad agents do all they can to subvert it
Game theory assumes
all agents are rational
they try to maximize their utility
2 / 22
Two Views of the World
Work on distributed computing and on cryptography has assumed
agents are either “good” or “bad”
good agents follow the protocol
bad agents do all they can to subvert it
Game theory assumes
all agents are rational
they try to maximize their utility
Both views make sense in different contexts
We want to combine them
2 / 22
k-Resilient Equilibria
Nash equilibrium tolerates deviations by one player.
It’s consistent with NE that 2 players could do better by
deviating.
An equilibrium is k-resilient if no group of size k can gain by
deviating (in a coordinated way).
Example: n > 1 players must play either 0 or 1.
if everyone plays 0, everyone gets 1
if exactly two players play 1, they get 2; the rest get 0.
otherwise; everyone gets 0.
Everyone playing 0 is a NE, but not 2-resilient.
3 / 22
Nash equilibrium = 1-resilient equilibrium.
In general, k-resilient equilibria do not exist if k > 1.
Aumann [1959] already considers n-resilient equilibria.
He called this strong equilibrium
Other related notions have also been considered in the
literature.
We are interested in more limited coalition sizes
It’s hard to imagine n people coordinating if n is large
In any case, resilience does not give us all the robustness we
need in large systems.
4 / 22
“Irrational” Players
Some agents don’t seem to respond to incentives, perhaps because
their utilities are not what we thought they were
they are irrational
they have faulty computers
Apparently “irrational” behavior is not uncommon:
People share on Gnutella and Kazaa, seed on BitTorrent
5 / 22
Example: Consider a group of n bargaining agents.
If they all stay and bargain, then all get 2.
Anyone who goes home gets 1.
Anyone who stays gets 0 if not everyone stays.
Everyone staying is a k-resilient Nash equilibrium for all k < n, but
not immune to one “irrational” player going home.
People certainly take such possibilities into account!
6 / 22
Immunity
A protocol is t-immune if the payoffs of “good” agents are not
affected by the actions of up to t other agents.
Somewhat like Byzantine agreement in distributed computing.
Good agents reach agreement despite up to t faulty agents.
7 / 22
Immunity
A protocol is t-immune if the payoffs of “good” agents are not
affected by the actions of up to t other agents.
Somewhat like Byzantine agreement in distributed computing.
Good agents reach agreement despite up to t faulty agents.
Immunity and resilience are complementary
k-resilience says that groups of up to size k cannot gain by
deviating
t-immunity says that non-deviators do not suffer if groups of
size up to t deviate
7 / 22
Immunity
A protocol is t-immune if the payoffs of “good” agents are not
affected by the actions of up to t other agents.
Somewhat like Byzantine agreement in distributed computing.
Good agents reach agreement despite up to t faulty agents.
Immunity and resilience are complementary
k-resilience says that groups of up to size k cannot gain by
deviating
t-immunity says that non-deviators do not suffer if groups of
size up to t deviate
A (k, t)-robust protocol tolerates coalitions of size k and is
t-immune.
Nash equilibrium = (1,0)-robustness
In general, (k, t)-robust equilibria don’t exist
they can be obtained with the help of mediators
7 / 22
Mediators
Consider an auction where people do not want to bid publicly
public bidding reveals useful information
don’t want to do this in bidding for, e.g., oil drilling rights
If there were a mediator (trusted third party), we’d be all set . . .
Distributed computing example: Byzantine agreement
8 / 22
Implementing Mediators
Can we eliminate the mediator? If so, when?
Work in economics: implementing mediators with “cheap
talk” [Myerson, Forges, . . . ]
“implementation” means that if a NE can be achieved with a
mediator, the same NE can be achieved without
Work in CS: multi-party computation [Ben-Or, Goldwasser,
Goldreich, Micali, Wigderson, . . . ]
“implementation” means that “good” players follow the
recommended protocol; “bad” players can do anything they like
By considering (k, t)-robust equilibria, we can generalize the work
in both CS and economics.
9 / 22
Three Games
Technnically, in the results that follow, we are working with three
games:
An underlying (normal-form) game
A mediator game, where players communicate with the
mediator, then make a move in the underlying game
A cheap-talk game, where players talk to each other, then
make a move in the underlying game
The payoffs in all cases are the payoffs in the underlying game.
We are interested in knowing whether Nash equilibria in the
mediator game can be implemented in a cheap-talk game.
10 / 22
Typical results
Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a
mediator can be implemented using cheap talk.
No knowledge of other agents’ utilities required
The protocol has bounded running time that does not depend
on the utilities.
11 / 22
Typical results
Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a
mediator can be implemented using cheap talk.
No knowledge of other agents’ utilities required
The protocol has bounded running time that does not depend
on the utilities.
Theorem 1(b): Can’t do this if n ≤ 3k + 3t.
11 / 22
Typical results
Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a
mediator can be implemented using cheap talk.
No knowledge of other agents’ utilities required
The protocol has bounded running time that does not depend
on the utilities.
Theorem 1(b): Can’t do this if n ≤ 3k + 3t.
Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and
there is a punishment strategy (a way of punishing someone
caught deviating), then we can implement the mediator.
The protocol has unbounded running time, but constant
expected running time
11 / 22
Typical results
Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a
mediator can be implemented using cheap talk.
No knowledge of other agents’ utilities required
The protocol has bounded running time that does not depend
on the utilities.
Theorem 1(b): Can’t do this if n ≤ 3k + 3t.
Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and
there is a punishment strategy (a way of punishing someone
caught deviating), then we can implement the mediator.
The protocol has unbounded running time, but constant
expected running time
Theorem 2(b): Can’t do this if n ≤ 2k + 3t or no punishment
strategy
11 / 22
Typical results
Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a
mediator can be implemented using cheap talk.
No knowledge of other agents’ utilities required
The protocol has bounded running time that does not depend
on the utilities.
Theorem 1(b): Can’t do this if n ≤ 3k + 3t.
Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and
there is a punishment strategy (a way of punishing someone
caught deviating), then we can implement the mediator.
The protocol has unbounded running time, but constant
expected running time
Theorem 2(b): Can’t do this if n ≤ 2k + 3t or no punishment
strategy
Theorem 2(c): Unbounded running time is required. (In general,
the problem cannot be solved by a protocol that has bounded
running time.)
11 / 22
Theorem 3(a): If n > 2k + 2t and a broadcast facility is
available, can -implement a mediator.
12 / 22
Theorem 3(a): If n > 2k + 2t and a broadcast facility is
available, can -implement a mediator.
12 / 22
Theorem 3(a): If n > 2k + 2t and a broadcast facility is
available, can -implement a mediator.
Theorem 3(b): Can’t do it if n ≤ 2k + 2t.
12 / 22
Theorem 3(a): If n > 2k + 2t and a broadcast facility is
available, can -implement a mediator.
Theorem 3(b): Can’t do it if n ≤ 2k + 2t.
Theorem: If n > k + t, assuming cryptography,
polynomially-bounded players, a (k + t)-punishment strategy, and
a PKI (public-key infrastructure), then can -implement mediators
using cheap talk.
12 / 22
Theorem 3(a): If n > 2k + 2t and a broadcast facility is
available, can -implement a mediator.
Theorem 3(b): Can’t do it if n ≤ 2k + 2t.
Theorem: If n > k + t, assuming cryptography,
polynomially-bounded players, a (k + t)-punishment strategy, and
a PKI (public-key infrastructure), then can -implement mediators
using cheap talk.
Note how standard distributed computing assumptions make a big
difference to implementation!
12 / 22
Lower Bounds on Running Time
Theorem 5: If n ≤ 2k + 2t, then
(a) there is a game Γ with a (k, t)-robust strategy with a
mediator that cannot be implemented by any deterministic
cheap talk strategy.
(b) for all b, there is a game Γb with a (k, t)-robust strategy with
a mediator that cannot be implemented using cheap talk with
expected running time ≤ b.
(c) there is a game Γ with a (k, t)-robust strategy with a
mediator such that for all , there exists b such that we
cannot implement the mediator with error with a cheap-talk
strategy that runs in ≤ b steps.
13 / 22
Related Work
Lots of related work on implementation in both CS and game
theory:
work of Forges + Barany [≈1990] prove Theorem 1(a) with
k = 1
with 4 players, can implement a Nash equilibrium with a
mediator
work on secure multiparty [BGW88,CCD88] computation
gives Theorem 1(a) for all (k, t)!
14 / 22
Related Work
Lots of related work on implementation in both CS and game
theory:
work of Forges + Barany [≈1990] prove Theorem 1(a) with
k = 1
with 4 players, can implement a Nash equilibrium with a
mediator
work on secure multiparty [BGW88,CCD88] computation
gives Theorem 1(a) for all (k, t)!
Ben-Porath (’03): Theorem 2(a) with k = 1 (no crypto,
known utilities, but does sequential equilibrium)
Heller (’05): extends B-P to all k; proves matching lower
bound
14 / 22
Related Work
Lots of related work on implementation in both CS and game
theory:
work of Forges + Barany [≈1990] prove Theorem 1(a) with
k = 1
with 4 players, can implement a Nash equilibrium with a
mediator
work on secure multiparty [BGW88,CCD88] computation
gives Theorem 1(a) for all (k, t)!
Ben-Porath (’03): Theorem 2(a) with k = 1 (no crypto,
known utilities, but does sequential equilibrium)
Heller (’05): extends B-P to all k; proves matching lower
bound
Theorem 2(c) shows that B-P’s strategy must be incorrect
(because bounded); Heller’s has problems too
14 / 22
More Related Work
Urbano-Vila (’04) and Dodis-Halevi-Rabin (’00) get Theorem
4(a) if k = 1, n = 2
Theorem 5(a) shows UV’s strategy is incorrect
Izmalkov, Micali, Lepinski; Lepinski, Micali, Shelat (’05) prove
stronger implementation results, but require strong primitives
(envelopes and ballot-boxes) that cannot be implemented over
broadcast channels
Lysanskaya-Triandopoulos: Theorem 1(c) for k = 1
15 / 22
Asynchrony
All the results above assume that the system is synchronous
All players move simultaneously
All messages arrive within one step
Essentially, can assume that there is a global clock
16 / 22
Asynchrony
All the results above assume that the system is synchronous
All players move simultaneously
All messages arrive within one step
Essentially, can assume that there is a global clock
But the real world is often asynchronous.
There is no global clock
Players can move at arbitrary speeds relative to each other
There is no bound on message delivery time.
16 / 22
Working in an asynchronous system introduces new subtleties.
If i has not received a message from j, is it because j is slow
or faulty?
What are the payoffs if someone doesn’t decide in finite time?
17 / 22
Can prove results in the asynchronous case similar in spirit to those
in the synchronous case
Joint work with Ittai Abraham, Danny Dolev, and Ivan Geffner
Typical results:
Theorem 6: We can implement a mediator in an asynchronous
system
(a) if n > 4k + 4t
(b) If n > 3k + 4t and there is a punishment strategy.
Key point: the real world is asynchronous, while game theory has
typically implicitly assumed synchrony.
Game theory needs to think more about the impact of
asynchrony!
18 / 22
Techniques I: Secret Sharing
Agent 0 has a secret s (an integer) that she wants to share among
n other agents in such a way that any m of them can reconstruct it.
Adi Shamir’s secret-sharing protocol (1977):
Agent 0 chooses a polynomial p of degree m − 1 with
p(0) = s.
Agent 0 tells p(i) to agent i, i = 1, . . . , n
p(i) is agent i’s share of the secret
Any subset of m agents can pool their shares and reconstruct
p, and hence p(0).
No subset of size < m can figure out the secret.
19 / 22
Dealing with deviation in secret-sharing
What happens if there are players who deviate from the
secret-sharing protocol?
Can they prevent others from learning the secret?
Take the special case where p is a line (degree-1 polynomial) and
the secret is p(0).
n = 3 and player i lies about p(i), then the three points will
not be collinear.
Players will know that there is a problem, but won’t know the
secret.
But if n = 4 and one person deviates, then three points are
still collinear
The “good” players will know who deviated, and can still
reconstruct the line and learn p(0) (the secret)
In general, if we have a polynomial of degree > 3k, then we can
reconstruct the polynomial even if up to k players lie about their
values.
20 / 22
Techniques II: Circuits
Idea of protocol (due to Goldreich-Micali-Wigderson):
Consider a circuit for computing function f :
x1 x2 x3 xn. . .q q q q
q
q
q qd
d
d
d
d
d 
 
 
 
 
   dd
 
  
f (x1, . . . , xn)
21 / 22
Techniques II: Circuits
Idea of protocol (due to Goldreich-Micali-Wigderson):
Consider a circuit for computing function f :
x1 x2 x3 xn. . .q q q q
q
q
q qd
d
d
d
d
d 
 
 
 
 
   dd
 
  
f (x1, . . . , xn)
Want each agent to have a share of value of each node in
circuit
Each agent sends a share of its input to all other agents.
At the end, each agent has a share of f (x1, . . . , xn)
Agents use secret sharing to learn f (x1, . . . , xn)
If agent has incentive to lie about its input, then it could have
lied the same way with the mediator
21 / 22
Conclusions
Issues of coalitions and fault-tolerance are critical in
distributed computing, game theory, and cryptography.
By combining ideas from all three areas we can gain new
insights.
Better understanding of role of cryptography in games.
Better understanding of cheap talk
What happens if we take computational issues into account?
How about the structure of the network?
22 / 22

More Related Content

What's hot

DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
Tuhin_Das
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
IAEME Publication
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
jsk1950
 

What's hot (16)

LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
 
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear PairingsAn Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
 
Cns 1
Cns 1Cns 1
Cns 1
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Steganography
SteganographySteganography
Steganography
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
529 199-206
529 199-206529 199-206
529 199-206
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Blockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indyBlockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indy
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 
Datak526
Datak526Datak526
Datak526
 
BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达BDTC2015-新加坡管理大学-朱飞达
BDTC2015-新加坡管理大学-朱飞达
 

Similar to GDRR Opening Workshop - Computer Science Meets Game Theory: Implementing Mediators Robustly - Joe Halpern, August 7, 2019

Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
AfiqEfendy Zaen
 
security framework
security frameworksecurity framework
security framework
Jihad Labban
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
Nexgen Technology
 
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
Priyanka Aash
 

Similar to GDRR Opening Workshop - Computer Science Meets Game Theory: Implementing Mediators Robustly - Joe Halpern, August 7, 2019 (20)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Ve...
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Ve...Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Ve...
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Ve...
 
Blockchain: The New Technology of Trust
Blockchain: The New Technology of TrustBlockchain: The New Technology of Trust
Blockchain: The New Technology of Trust
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
 
BlockChain Overview Light
BlockChain Overview LightBlockChain Overview Light
BlockChain Overview Light
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Eris Industries - American Banker presentation deck.
Eris Industries - American Banker presentation deck. Eris Industries - American Banker presentation deck.
Eris Industries - American Banker presentation deck.
 
security framework
security frameworksecurity framework
security framework
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
Jehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spendJehyuk jang and heung no lee ieee double spend
Jehyuk jang and heung no lee ieee double spend
 
Blockchain Organiseren
Blockchain OrganiserenBlockchain Organiseren
Blockchain Organiseren
 
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
You May Have Paid more than you imagine: Replay Attacks on Ethereum Smart Con...
 
Jehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieeeJehyuk jang and heung no lee ieee
Jehyuk jang and heung no lee ieee
 
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONSTHE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
 
Molly Suda - Smart contracts for smart people and Applications in the U.S ene...
Molly Suda - Smart contracts for smart people and Applications in the U.S ene...Molly Suda - Smart contracts for smart people and Applications in the U.S ene...
Molly Suda - Smart contracts for smart people and Applications in the U.S ene...
 

More from The Statistical and Applied Mathematical Sciences Institute

Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
The Statistical and Applied Mathematical Sciences Institute
 
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
Causal Inference Opening Workshop - Difference-in-differences: more than meet...Causal Inference Opening Workshop - Difference-in-differences: more than meet...
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
The Statistical and Applied Mathematical Sciences Institute
 
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
The Statistical and Applied Mathematical Sciences Institute
 
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
The Statistical and Applied Mathematical Sciences Institute
 
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
The Statistical and Applied Mathematical Sciences Institute
 
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
The Statistical and Applied Mathematical Sciences Institute
 

More from The Statistical and Applied Mathematical Sciences Institute (20)

Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...
Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...
Causal Inference Opening Workshop - Latent Variable Models, Causal Inference,...
 
2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...
2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...
2019 Fall Series: Special Guest Lecture - 0-1 Phase Transitions in High Dimen...
 
Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...
Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...
Causal Inference Opening Workshop - Causal Discovery in Neuroimaging Data - F...
 
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
Causal Inference Opening Workshop - Smooth Extensions to BART for Heterogeneo...
 
Causal Inference Opening Workshop - A Bracketing Relationship between Differe...
Causal Inference Opening Workshop - A Bracketing Relationship between Differe...Causal Inference Opening Workshop - A Bracketing Relationship between Differe...
Causal Inference Opening Workshop - A Bracketing Relationship between Differe...
 
Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...
Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...
Causal Inference Opening Workshop - Testing Weak Nulls in Matched Observation...
 
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
Causal Inference Opening Workshop - Difference-in-differences: more than meet...Causal Inference Opening Workshop - Difference-in-differences: more than meet...
Causal Inference Opening Workshop - Difference-in-differences: more than meet...
 
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
Causal Inference Opening Workshop - New Statistical Learning Methods for Esti...
 
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
Causal Inference Opening Workshop - Bipartite Causal Inference with Interfere...
 
Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...
Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...
Causal Inference Opening Workshop - Bridging the Gap Between Causal Literatur...
 
Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...
Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...
Causal Inference Opening Workshop - Some Applications of Reinforcement Learni...
 
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
Causal Inference Opening Workshop - Bracketing Bounds for Differences-in-Diff...
 
Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...
Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...
Causal Inference Opening Workshop - Assisting the Impact of State Polcies: Br...
 
Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...
Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...
Causal Inference Opening Workshop - Experimenting in Equilibrium - Stefan Wag...
 
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
Causal Inference Opening Workshop - Targeted Learning for Causal Inference Ba...
 
Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...
Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...
Causal Inference Opening Workshop - Bayesian Nonparametric Models for Treatme...
 
2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...
2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...
2019 Fall Series: Special Guest Lecture - Adversarial Risk Analysis of the Ge...
 
2019 Fall Series: Professional Development, Writing Academic Papers…What Work...
2019 Fall Series: Professional Development, Writing Academic Papers…What Work...2019 Fall Series: Professional Development, Writing Academic Papers…What Work...
2019 Fall Series: Professional Development, Writing Academic Papers…What Work...
 
2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...
2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...
2019 GDRR: Blockchain Data Analytics - Machine Learning in/for Blockchain: Fu...
 
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 

GDRR Opening Workshop - Computer Science Meets Game Theory: Implementing Mediators Robustly - Joe Halpern, August 7, 2019

  • 1. Distributed Computing Meets Game Theory Robust Mechanisms for Secret Sharing and Implementation with Cheap Talk Joe Halpern Cornell University Joint work with Ittai Abraham, Danny Dolev, Rica Gonen 1 / 22
  • 2. Two Views of the World Work on distributed computing and on cryptography has assumed agents are either “good” or “bad” good agents follow the protocol bad agents do all they can to subvert it 2 / 22
  • 3. Two Views of the World Work on distributed computing and on cryptography has assumed agents are either “good” or “bad” good agents follow the protocol bad agents do all they can to subvert it Game theory assumes all agents are rational they try to maximize their utility 2 / 22
  • 4. Two Views of the World Work on distributed computing and on cryptography has assumed agents are either “good” or “bad” good agents follow the protocol bad agents do all they can to subvert it Game theory assumes all agents are rational they try to maximize their utility Both views make sense in different contexts We want to combine them 2 / 22
  • 5. k-Resilient Equilibria Nash equilibrium tolerates deviations by one player. It’s consistent with NE that 2 players could do better by deviating. An equilibrium is k-resilient if no group of size k can gain by deviating (in a coordinated way). Example: n > 1 players must play either 0 or 1. if everyone plays 0, everyone gets 1 if exactly two players play 1, they get 2; the rest get 0. otherwise; everyone gets 0. Everyone playing 0 is a NE, but not 2-resilient. 3 / 22
  • 6. Nash equilibrium = 1-resilient equilibrium. In general, k-resilient equilibria do not exist if k > 1. Aumann [1959] already considers n-resilient equilibria. He called this strong equilibrium Other related notions have also been considered in the literature. We are interested in more limited coalition sizes It’s hard to imagine n people coordinating if n is large In any case, resilience does not give us all the robustness we need in large systems. 4 / 22
  • 7. “Irrational” Players Some agents don’t seem to respond to incentives, perhaps because their utilities are not what we thought they were they are irrational they have faulty computers Apparently “irrational” behavior is not uncommon: People share on Gnutella and Kazaa, seed on BitTorrent 5 / 22
  • 8. Example: Consider a group of n bargaining agents. If they all stay and bargain, then all get 2. Anyone who goes home gets 1. Anyone who stays gets 0 if not everyone stays. Everyone staying is a k-resilient Nash equilibrium for all k < n, but not immune to one “irrational” player going home. People certainly take such possibilities into account! 6 / 22
  • 9. Immunity A protocol is t-immune if the payoffs of “good” agents are not affected by the actions of up to t other agents. Somewhat like Byzantine agreement in distributed computing. Good agents reach agreement despite up to t faulty agents. 7 / 22
  • 10. Immunity A protocol is t-immune if the payoffs of “good” agents are not affected by the actions of up to t other agents. Somewhat like Byzantine agreement in distributed computing. Good agents reach agreement despite up to t faulty agents. Immunity and resilience are complementary k-resilience says that groups of up to size k cannot gain by deviating t-immunity says that non-deviators do not suffer if groups of size up to t deviate 7 / 22
  • 11. Immunity A protocol is t-immune if the payoffs of “good” agents are not affected by the actions of up to t other agents. Somewhat like Byzantine agreement in distributed computing. Good agents reach agreement despite up to t faulty agents. Immunity and resilience are complementary k-resilience says that groups of up to size k cannot gain by deviating t-immunity says that non-deviators do not suffer if groups of size up to t deviate A (k, t)-robust protocol tolerates coalitions of size k and is t-immune. Nash equilibrium = (1,0)-robustness In general, (k, t)-robust equilibria don’t exist they can be obtained with the help of mediators 7 / 22
  • 12. Mediators Consider an auction where people do not want to bid publicly public bidding reveals useful information don’t want to do this in bidding for, e.g., oil drilling rights If there were a mediator (trusted third party), we’d be all set . . . Distributed computing example: Byzantine agreement 8 / 22
  • 13. Implementing Mediators Can we eliminate the mediator? If so, when? Work in economics: implementing mediators with “cheap talk” [Myerson, Forges, . . . ] “implementation” means that if a NE can be achieved with a mediator, the same NE can be achieved without Work in CS: multi-party computation [Ben-Or, Goldwasser, Goldreich, Micali, Wigderson, . . . ] “implementation” means that “good” players follow the recommended protocol; “bad” players can do anything they like By considering (k, t)-robust equilibria, we can generalize the work in both CS and economics. 9 / 22
  • 14. Three Games Technnically, in the results that follow, we are working with three games: An underlying (normal-form) game A mediator game, where players communicate with the mediator, then make a move in the underlying game A cheap-talk game, where players talk to each other, then make a move in the underlying game The payoffs in all cases are the payoffs in the underlying game. We are interested in knowing whether Nash equilibria in the mediator game can be implemented in a cheap-talk game. 10 / 22
  • 15. Typical results Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a mediator can be implemented using cheap talk. No knowledge of other agents’ utilities required The protocol has bounded running time that does not depend on the utilities. 11 / 22
  • 16. Typical results Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a mediator can be implemented using cheap talk. No knowledge of other agents’ utilities required The protocol has bounded running time that does not depend on the utilities. Theorem 1(b): Can’t do this if n ≤ 3k + 3t. 11 / 22
  • 17. Typical results Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a mediator can be implemented using cheap talk. No knowledge of other agents’ utilities required The protocol has bounded running time that does not depend on the utilities. Theorem 1(b): Can’t do this if n ≤ 3k + 3t. Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and there is a punishment strategy (a way of punishing someone caught deviating), then we can implement the mediator. The protocol has unbounded running time, but constant expected running time 11 / 22
  • 18. Typical results Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a mediator can be implemented using cheap talk. No knowledge of other agents’ utilities required The protocol has bounded running time that does not depend on the utilities. Theorem 1(b): Can’t do this if n ≤ 3k + 3t. Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and there is a punishment strategy (a way of punishing someone caught deviating), then we can implement the mediator. The protocol has unbounded running time, but constant expected running time Theorem 2(b): Can’t do this if n ≤ 2k + 3t or no punishment strategy 11 / 22
  • 19. Typical results Theorem 1(a): If n > 3k + 3t, a (k, t)-robust strategy σ with a mediator can be implemented using cheap talk. No knowledge of other agents’ utilities required The protocol has bounded running time that does not depend on the utilities. Theorem 1(b): Can’t do this if n ≤ 3k + 3t. Theorem 2(a): If n > 2k + 3t, agents’ utilities are known, and there is a punishment strategy (a way of punishing someone caught deviating), then we can implement the mediator. The protocol has unbounded running time, but constant expected running time Theorem 2(b): Can’t do this if n ≤ 2k + 3t or no punishment strategy Theorem 2(c): Unbounded running time is required. (In general, the problem cannot be solved by a protocol that has bounded running time.) 11 / 22
  • 20. Theorem 3(a): If n > 2k + 2t and a broadcast facility is available, can -implement a mediator. 12 / 22
  • 21. Theorem 3(a): If n > 2k + 2t and a broadcast facility is available, can -implement a mediator. 12 / 22
  • 22. Theorem 3(a): If n > 2k + 2t and a broadcast facility is available, can -implement a mediator. Theorem 3(b): Can’t do it if n ≤ 2k + 2t. 12 / 22
  • 23. Theorem 3(a): If n > 2k + 2t and a broadcast facility is available, can -implement a mediator. Theorem 3(b): Can’t do it if n ≤ 2k + 2t. Theorem: If n > k + t, assuming cryptography, polynomially-bounded players, a (k + t)-punishment strategy, and a PKI (public-key infrastructure), then can -implement mediators using cheap talk. 12 / 22
  • 24. Theorem 3(a): If n > 2k + 2t and a broadcast facility is available, can -implement a mediator. Theorem 3(b): Can’t do it if n ≤ 2k + 2t. Theorem: If n > k + t, assuming cryptography, polynomially-bounded players, a (k + t)-punishment strategy, and a PKI (public-key infrastructure), then can -implement mediators using cheap talk. Note how standard distributed computing assumptions make a big difference to implementation! 12 / 22
  • 25. Lower Bounds on Running Time Theorem 5: If n ≤ 2k + 2t, then (a) there is a game Γ with a (k, t)-robust strategy with a mediator that cannot be implemented by any deterministic cheap talk strategy. (b) for all b, there is a game Γb with a (k, t)-robust strategy with a mediator that cannot be implemented using cheap talk with expected running time ≤ b. (c) there is a game Γ with a (k, t)-robust strategy with a mediator such that for all , there exists b such that we cannot implement the mediator with error with a cheap-talk strategy that runs in ≤ b steps. 13 / 22
  • 26. Related Work Lots of related work on implementation in both CS and game theory: work of Forges + Barany [≈1990] prove Theorem 1(a) with k = 1 with 4 players, can implement a Nash equilibrium with a mediator work on secure multiparty [BGW88,CCD88] computation gives Theorem 1(a) for all (k, t)! 14 / 22
  • 27. Related Work Lots of related work on implementation in both CS and game theory: work of Forges + Barany [≈1990] prove Theorem 1(a) with k = 1 with 4 players, can implement a Nash equilibrium with a mediator work on secure multiparty [BGW88,CCD88] computation gives Theorem 1(a) for all (k, t)! Ben-Porath (’03): Theorem 2(a) with k = 1 (no crypto, known utilities, but does sequential equilibrium) Heller (’05): extends B-P to all k; proves matching lower bound 14 / 22
  • 28. Related Work Lots of related work on implementation in both CS and game theory: work of Forges + Barany [≈1990] prove Theorem 1(a) with k = 1 with 4 players, can implement a Nash equilibrium with a mediator work on secure multiparty [BGW88,CCD88] computation gives Theorem 1(a) for all (k, t)! Ben-Porath (’03): Theorem 2(a) with k = 1 (no crypto, known utilities, but does sequential equilibrium) Heller (’05): extends B-P to all k; proves matching lower bound Theorem 2(c) shows that B-P’s strategy must be incorrect (because bounded); Heller’s has problems too 14 / 22
  • 29. More Related Work Urbano-Vila (’04) and Dodis-Halevi-Rabin (’00) get Theorem 4(a) if k = 1, n = 2 Theorem 5(a) shows UV’s strategy is incorrect Izmalkov, Micali, Lepinski; Lepinski, Micali, Shelat (’05) prove stronger implementation results, but require strong primitives (envelopes and ballot-boxes) that cannot be implemented over broadcast channels Lysanskaya-Triandopoulos: Theorem 1(c) for k = 1 15 / 22
  • 30. Asynchrony All the results above assume that the system is synchronous All players move simultaneously All messages arrive within one step Essentially, can assume that there is a global clock 16 / 22
  • 31. Asynchrony All the results above assume that the system is synchronous All players move simultaneously All messages arrive within one step Essentially, can assume that there is a global clock But the real world is often asynchronous. There is no global clock Players can move at arbitrary speeds relative to each other There is no bound on message delivery time. 16 / 22
  • 32. Working in an asynchronous system introduces new subtleties. If i has not received a message from j, is it because j is slow or faulty? What are the payoffs if someone doesn’t decide in finite time? 17 / 22
  • 33. Can prove results in the asynchronous case similar in spirit to those in the synchronous case Joint work with Ittai Abraham, Danny Dolev, and Ivan Geffner Typical results: Theorem 6: We can implement a mediator in an asynchronous system (a) if n > 4k + 4t (b) If n > 3k + 4t and there is a punishment strategy. Key point: the real world is asynchronous, while game theory has typically implicitly assumed synchrony. Game theory needs to think more about the impact of asynchrony! 18 / 22
  • 34. Techniques I: Secret Sharing Agent 0 has a secret s (an integer) that she wants to share among n other agents in such a way that any m of them can reconstruct it. Adi Shamir’s secret-sharing protocol (1977): Agent 0 chooses a polynomial p of degree m − 1 with p(0) = s. Agent 0 tells p(i) to agent i, i = 1, . . . , n p(i) is agent i’s share of the secret Any subset of m agents can pool their shares and reconstruct p, and hence p(0). No subset of size < m can figure out the secret. 19 / 22
  • 35. Dealing with deviation in secret-sharing What happens if there are players who deviate from the secret-sharing protocol? Can they prevent others from learning the secret? Take the special case where p is a line (degree-1 polynomial) and the secret is p(0). n = 3 and player i lies about p(i), then the three points will not be collinear. Players will know that there is a problem, but won’t know the secret. But if n = 4 and one person deviates, then three points are still collinear The “good” players will know who deviated, and can still reconstruct the line and learn p(0) (the secret) In general, if we have a polynomial of degree > 3k, then we can reconstruct the polynomial even if up to k players lie about their values. 20 / 22
  • 36. Techniques II: Circuits Idea of protocol (due to Goldreich-Micali-Wigderson): Consider a circuit for computing function f : x1 x2 x3 xn. . .q q q q q q q qd d d d d d             dd      f (x1, . . . , xn) 21 / 22
  • 37. Techniques II: Circuits Idea of protocol (due to Goldreich-Micali-Wigderson): Consider a circuit for computing function f : x1 x2 x3 xn. . .q q q q q q q qd d d d d d             dd      f (x1, . . . , xn) Want each agent to have a share of value of each node in circuit Each agent sends a share of its input to all other agents. At the end, each agent has a share of f (x1, . . . , xn) Agents use secret sharing to learn f (x1, . . . , xn) If agent has incentive to lie about its input, then it could have lied the same way with the mediator 21 / 22
  • 38. Conclusions Issues of coalitions and fault-tolerance are critical in distributed computing, game theory, and cryptography. By combining ideas from all three areas we can gain new insights. Better understanding of role of cryptography in games. Better understanding of cheap talk What happens if we take computational issues into account? How about the structure of the network? 22 / 22