58,730 research outputs found

    Nature-inspired synthesis of rational protocols

    Get PDF
    Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), Dortmund, Germany, September 13-17, 2008.Rational cryptography is an emerging field which combines aspects traditionally related to security with concepts described in economic theoretical frameworks. For example, it applies game theory concepts to address security problems arising when executing cryptographic protocols. The aim is to replace the assumption of a worst-case attacker by the notion of rational agents that try to maximize their payoffs. In this work, we define a formal framework and a meta--heuristic technique for the automated synthesis of multi-party rational exchange security (M-RES) protocols. We provide experimental results for a simple scenario where a 3-party rational exchange protocol is automatically designed.Publicad

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    SOLACE: A framework for electronic negotiations

    Get PDF
    Copyright @ 2011 Walter de Gruyter GmbHMost existing frameworks for electronic negotiations today are tied to specific negotiation systems for which they were developed, preventing them from being applied to other negotiation scenarios. Thus, the evaluation of electronic negotiation systems is difficult as each one is based on a different framework. Additionally, each developer has to design a new framework for any system to be developed, leading to a ‘reinvention of the wheel’. This paper presents SOLACE—a generic framework for multi-issue negotiations, which can be applied to a variety of negotiation scenarios. In contrast with other frameworks for electronic negotiations, SOLACE supports hybrid systems in which the negotiation participants can be humans, agents or a combination of the two. By recognizing the importance of strategies in negotiations and incorporating a time attribute in negotiation proposals, SOLACE enhances existing approaches and provides a foundation for the flexible electronic negotiation systems of the future

    Non-Cooperative Rational Interactive Proofs

    Get PDF
    Interactive-proof games model the scenario where an honest party interacts with powerful but strategic provers, to elicit from them the correct answer to a computational question. Interactive proofs are increasingly used as a framework to design protocols for computation outsourcing. Existing interactive-proof games largely fall into two categories: either as games of cooperation such as multi-prover interactive proofs and cooperative rational proofs, where the provers work together as a team; or as games of conflict such as refereed games, where the provers directly compete with each other in a zero-sum game. Neither of these extremes truly capture the strategic nature of service providers in outsourcing applications. How to design and analyze non-cooperative interactive proofs is an important open problem. In this paper, we introduce a mechanism-design approach to define a multi-prover interactive-proof model in which the provers are rational and non-cooperative - they act to maximize their expected utility given others\u27 strategies. We define a strong notion of backwards induction as our solution concept to analyze the resulting extensive-form game with imperfect information. We fully characterize the complexity of our proof system under different utility gap guarantees. (At a high level, a utility gap of u means that the protocol is robust against provers that may not care about a utility loss of 1/u.) We show, for example, that the power of non-cooperative rational interactive proofs with a polynomial utility gap is exactly equal to the complexity class P^{NEXP}

    Atomic Appends: Selling Cars and Coordinating Armies with Multiple Distributed Ledgers

    Get PDF
    The various applications using Distributed Ledger Technologies (DLT) or blockchains, have led to the introduction of a new "marketplace" where multiple types of digital assets may be exchanged. As each blockchain is designed to support specific types of assets and transactions, and no blockchain will prevail, the need to perform interblockchain transactions is already pressing. In this work we examine the fundamental problem of interoperable and interconnected blockchains. In particular, we begin by introducing the Multi-Distributed Ledger Objects (MDLO), which is the result of aggregating multiple Distributed Ledger Objects - DLO (a DLO is a formalization of the blockchain) and that supports append and get operations of records (e.g., transactions) in them from multiple clients concurrently. Next we define the AtomicAppends problem, which emerges when the exchange of digital assets between multiple clients may involve appending records in more than one DLO. Specifically, AtomicAppend requires that either all records will be appended on the involved DLOs or none. We examine the solvability of this problem assuming rational and risk-averse clients that may fail by crashing, and under different client utility and append models, timing models, and client failure scenarios. We show that for some cases the existence of an intermediary is necessary for the problem solution. We propose the implementation of such intermediary over a specialized blockchain, we term Smart DLO (SDLO), and we show how this can be used to solve the AtomicAppends problem even in an asynchronous, client competitive environment, where all the clients may crash

    Implementing an Agent Trade Server

    Full text link
    An experimental server for stock trading autonomous agents is presented and made available, together with an agent shell for swift development. The server, written in Java, was implemented as proof-of-concept for an agent trade server for a real financial exchange.Comment: 14 pages, 7 figures, intended for B/W printin
    • …
    corecore