5,599 research outputs found
Exact Algorithms for Solving Stochastic Games
Shapley's discounted stochastic games, Everett's recursive games and
Gillette's undiscounted stochastic games are classical models of game theory
describing two-player zero-sum games of potentially infinite duration. We
describe algorithms for exactly solving these games
Classical Cryptographic Protocols in a Quantum World
Cryptographic protocols, such as protocols for secure function evaluation
(SFE), have played a crucial role in the development of modern cryptography.
The extensive theory of these protocols, however, deals almost exclusively with
classical attackers. If we accept that quantum information processing is the
most realistic model of physically feasible computation, then we must ask: what
classical protocols remain secure against quantum attackers?
Our main contribution is showing the existence of classical two-party
protocols for the secure evaluation of any polynomial-time function under
reasonable computational assumptions (for example, it suffices that the
learning with errors problem be hard for quantum polynomial time). Our result
shows that the basic two-party feasibility picture from classical cryptography
remains unchanged in a quantum world.Comment: Full version of an old paper in Crypto'11. Invited to IJQI. This is
authors' copy with different formattin
Infinite-Duration Bidding Games
Two-player games on graphs are widely studied in formal methods as they model
the interaction between a system and its environment. The game is played by
moving a token throughout a graph to produce an infinite path. There are
several common modes to determine how the players move the token through the
graph; e.g., in turn-based games the players alternate turns in moving the
token. We study the {\em bidding} mode of moving the token, which, to the best
of our knowledge, has never been studied in infinite-duration games. The
following bidding rule was previously defined and called Richman bidding. Both
players have separate {\em budgets}, which sum up to . In each turn, a
bidding takes place: Both players submit bids simultaneously, where a bid is
legal if it does not exceed the available budget, and the higher bidder pays
his bid to the other player and moves the token. The central question studied
in bidding games is a necessary and sufficient initial budget for winning the
game: a {\em threshold} budget in a vertex is a value such that
if Player 's budget exceeds , he can win the game, and if Player 's
budget exceeds , he can win the game. Threshold budgets were previously
shown to exist in every vertex of a reachability game, which have an
interesting connection with {\em random-turn} games -- a sub-class of simple
stochastic games in which the player who moves is chosen randomly. We show the
existence of threshold budgets for a qualitative class of infinite-duration
games, namely parity games, and a quantitative class, namely mean-payoff games.
The key component of the proof is a quantitative solution to strongly-connected
mean-payoff bidding games in which we extend the connection with random-turn
games to these games, and construct explicit optimal strategies for both
players.Comment: A short version appeared in CONCUR 2017. The paper is accepted to
JAC
Constant-Round Concurrent Zero-Knowledge From Falsifiable Assumptions
We present a constant-round concurrent zero-knowledge protocol for \NP. Our protocol is sound against uniform polynomial-time attackers, and relies on the existence of families of collision-resistant hash functions, and a new (but in our eyes, natural) falsifiable intractability assumption: Roughly speaking, that Micali's non-interactive CS-proofs are sound for languages in
Composability in quantum cryptography
In this article, we review several aspects of composability in the context of
quantum cryptography. The first part is devoted to key distribution. We discuss
the security criteria that a quantum key distribution protocol must fulfill to
allow its safe use within a larger security application (e.g., for secure
message transmission). To illustrate the practical use of composability, we
show how to generate a continuous key stream by sequentially composing rounds
of a quantum key distribution protocol. In a second part, we take a more
general point of view, which is necessary for the study of cryptographic
situations involving, for example, mutually distrustful parties. We explain the
universal composability framework and state the composition theorem which
guarantees that secure protocols can securely be composed to larger
applicationsComment: 18 pages, 2 figure
- …