首页> 外文会议>IEEE Annual Symposium on Foundations of Computer Science >Rational Protocol Design: Cryptography against Incentive-Driven Adversaries
【24h】

Rational Protocol Design: Cryptography against Incentive-Driven Adversaries

机译:合理的协议设计:针对激励驱动的对手的密码学

获取原文
获取外文期刊封面目录资料

摘要

Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is better suited to modeling a protocol under attack from an external entity. Specifically, we consider a two-party game between an protocol designer and an external attacker. The goal of the attacker is to break security properties such as correctness or privacy, possibly by corrupting protocol participants; the goal of the protocol designer is to prevent the attacker from succeeding. We lay the theoretical groundwork for a study of cryptographic protocol design in this setting by providing a methodology for defining the problem within the traditional simulation paradigm. Our framework provides ways of reasoning about important cryptographic concepts (e.g., adaptive corruptions or attacks on communication resources) not handled by previous game-theoretic treatments of cryptography. We also prove composition theorems that-for the first time-provide a sound way to design rational protocols assuming "ideal communication resources" (such as broadcast or authenticated channels) and then instantiate these resources using standard cryptographic tools. Finally, we investigate the problem of secure function evaluation in our framework, where the attacker has to pay for each party it corrupts. Our results demonstrate how knowledge of the attacker's incentives can be used to circumvent known impossibility results in this setting.
机译:关于“合理密码协议”的现有工作将运行该协议的每一方(或各方的联盟)都视为自私的代理,试图最大限度地发挥其效用。在这项工作中,我们提出了一种根本不同的方法,该方法更适合于对来自外部实体的攻击下的协议进行建模。具体来说,我们考虑了协议设计者和外部攻击者之间的两方游戏。攻击者的目的是破坏协议参与者的安全特性,例如正确性或隐私性。协议设计者的目标是防止攻击者成功。通过提供一种在传统仿真范式中定义问题的方法,我们为在这种情况下进行密码协议设计的研究奠定了理论基础。我们的框架提供了有关以前的游戏理论对密码学未曾处理过的重要密码学概念(例如,适应性破坏或对通信资源的攻击)进行推理的方法。我们还证明了组成定理,这是首次提供了一种合理的方法来设计假设“理想的通信资源”(例如广播或已认证的信道)的合理协议,然后使用标准密码工具实例化这些资源。最后,我们在我们的框架中研究安全功能评估的问题,在此框架中,攻击者必须为遭受破坏的每一方付费。我们的结果表明,在这种情况下,如何利用攻击者的诱因知识来规避已知的不可能结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号