Fairness with an Honest Minority and a Rational Majority

نویسندگان

  • Shien Jin Ong
  • David C. Parkes
  • Alon Rosen
  • Salil P. Vadhan
چکیده

We provide a simple protocol for secret reconstruction in any threshold secret sharing scheme, and prove that it is fair when executed with many rational parties together with a small minority of honest parties. That is, all parties will learn the secret with high probability when the honest parties follow the protocol and the rational parties act in their own self-interest (as captured by a set-Nash analogue of trembling hand perfect equilibrium). The protocol only requires a standard (synchronous) broadcast channel, tolerates both early stopping and incorrectly computed messages, and only requires 2 rounds of communication. Previous protocols for this problem in the cryptographic or economic models have either required an honest majority, used strong communication channels that enable simultaneous exchange of information, or settled for approximate notions of security/equilibria. They all also required a nonconstant number of rounds of communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation

In the setting of multiparty computation, a set of parties wish to jointly compute a function of their inputs, while preserving security in the case that some subset of them are corrupted. The typical security properties considered are privacy, correctness, independence of inputs, guaranteed output delivery and fairness. Until now, all works in this area either considered the case that the corr...

متن کامل

1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds

A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation, where parties give their inputs to a trusted party which returns the output of the functionality to all parties. In particular, in the ideal model such computation is fair – all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not...

متن کامل

Opportunistic Discrimination ∗

Are minorities more vulnerable to opportunism? We find that individuals from a minority group face greater danger of being cheated by an opportunistic firm because trade with the group is less frequent and the value of a reputation for fairness toward the group is correspondingly smaller. If the majority is sufficiently large it can only lose from a solidarity strategy of punishing opportunism ...

متن کامل

Complete Fairness in Multi-party Computation without an Honest Majority

Gordon et al. recently showed that certain (non-trivial) functions can be computed withcomplete fairness in the two-party setting. Motivated by their results, we initiate a study ofcomplete fairness in the multi-party case and demonstrate the first completely-fair protocols fornon-trivial functions in this setting. We also provide evidence that achieving fairness is “harder”...

متن کامل

Fair and Efficient Secure Multiparty Computation with Reputation Systems

A reputation system for a set of entities is essentially a list of scores that provides a measure of the reliability of each entity in the set. The score given to an entity can be interpreted (and in the reputation system literature it often is [12]) as the probability that an entity will behave honestly. In this paper, we ask whether or not it is possible to utilize reputation systems for carr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008