【24h】

Towards a General Theory of Non-Cooperative Computation

机译:迈向非合作计算的一般理论

获取原文
获取原文并翻译 | 示例

摘要

We generalize the framework of non-cooperative computation (NCC), recently introduced by Shoham and Tennenholtz, to apply to cryptographic situations. We consider functions whose inputs are held by separate, self-interested agents. We consider four components of each agent's utility function: (a) the wish to know the correct value of the function, (b) the wish to prevent others from knowing it, (c) the wish to prevent others from knowing one's own private input, and (d) the wish to know other agents' private inputs. We provide an exhaustive game theoretic analysis of all 24 possible lexicographic orderings among these four considerations, for the case of Boolean functions (mercifully, these 24 cases collapse to four). In each case we identify the class of functions for which there exists an incentive-compatible mechanism for computing the function. In this article we only consider the situation in which the inputs of different agents are probabilistically independent.
机译:我们归纳了Shoham和Tennenholtz最近引入的非合作计算(NCC)框架,以将其应用于加密情况。我们考虑其职能由独立的,自利的代理商持有的职能。我们考虑了每个代理的效用函数的四个组成部分:(a)希望知道该函数的正确值,(b)希望阻止其他人知道该函数的价值,(c)希望阻止其他人知道自己的私人输入,以及(d)希望了解其他代理商的私人投入。对于布尔函数,我们对这四个考虑因素中的所有24种可能的字典顺序进行了详尽的博弈论分析(幸运的是,这24种情况崩溃为4种)。在每种情况下,我们都确定存在用于计算功能的激励兼容机制的功能类别。在本文中,我们仅考虑不同主体的输入概率独立的情况。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号