Rationality and adversarial behavior in multi-party computation

Anna Lysyanskaya, Nikos Triandopoulos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

110 Scopus citations

Abstract

We study multi-party computation in the model where none of n participating parties are honest: they are either rational, acting in their selfish interest to maximize their utility, or adversarial, acting arbitrarily. In this new model, which we call the mixed-behavior model, we define a class of functions that can be computed in the presence of an adversary using a trusted mediator. We then give a protocol that allows the rational parties to emulate the mediator and jointly compute the function such that (1) assuming that each rational party prefers that it learns the output while others do not, no rational party has an incentive to deviate from the protocol; and (2) the rational parties are protected from a malicious adversary controlling ⌈n/2⌉ - 2 of the participants: the adversary can only either cause all rational participants to abort (so no one learns the function they are trying to compute), or can only learn whatever information is implied by the output of the function.

Original languageEnglish
Title of host publicationAdvances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
Pages180-197
Number of pages18
DOIs
StatePublished - 2006
Event26th Annual International Cryptology Conference, CRYPTO 2006 - Seattle, WA, United States
Duration: 20 Aug 200624 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4117 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th Annual International Cryptology Conference, CRYPTO 2006
Country/TerritoryUnited States
CitySeattle, WA
Period20/08/0624/08/06

Fingerprint

Dive into the research topics of 'Rationality and adversarial behavior in multi-party computation'. Together they form a unique fingerprint.

Cite this