Cryptography and Mechanism Design
نویسنده
چکیده
Mechanism Design is the algorithmic component of Game Theory, the synthesis of protocols for selfish parties to achieve certain properties. A protocol is a me thod to aggregate the preferences of the parties in order to decide on some "social choice," where typical examples include: deciding whether a community should build a bridge, how to route packets in a network and deciding who wins an auction. Each par ty has a utility function which expresses how much it values each possible outcome of the protocol. The goal is to design a protocol where the winning strategies achieve the social choice. Recently Mechanism Design has received at tent ion by computer scientists in light of the above applications, see [19, 20]. An important result in Mechanism Design is the Revelation Principle that essentially states that if there is a game with dominating strategies achieving a given social choice function, then there is a mechanism where the parties simply report their t rue util i ty functions. The resulting protocol is therefore: each par ty send in.formation about its utility function to a center. The center then decides on the outcome of the protocol based on the parties ' reports. It is often assumed that the center can be t rusted by the parties, but this might not always be true, especially in an Internet environment. The revelation principle might not be applicable if the center is corrupt and misuses the t ru thful bids it receives. Privacy is therefore essential in order to ensure the center's credibility. This problem was stated by Varian [23] as follows: "Even if current information can be safeguarded, records of past behavior can be extremely valuable, since historical data can be used to estimate the willingness to pay. What should be the appropriate technological and social safeguards to deal with this problem?" Cryptography deals with preserving the secrecy and integrity of da ta in computer and communication systems. An exciting topic of cryptographic research in the last two decades is secure .function evaluation (see [6] for an introduction). For any function f ( x l , x 2 , . . . , xn) it is possible in principle to construct a protocol that allows a group of n parties, where par ty i has as its private input ai, to jointly evaluate f(o~l, a 2 , . . . , an). Following the protocol the parties learn f(c~l, a 2 , . . , c~n) but no par ty i can learn about the other inputs {a j} j¢ i more than can be computed from ai and f (o~1, a2, • • • O~n). Given t h a t any mechanism can be considered as an evaluation of a function of the utility function, it is tempt ing to t ry and use such a secure evaluation protocol in order to eliminate the
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملFUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR
A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...
متن کاملInterleaving Cryptography and Mechanism Design: The Case of Online Auctions
We propose a new cryptographically protected multi-round auction mechanism for online auctions. This auction mechanism is designed to provide (in this order) security, cognitive convenience, and round-effectiveness. One can vary internal parameters of the mechanism to trade off bid privacy and cognitive costs, or cognitive costs and the number of rounds. We are aware of no previous work that in...
متن کاملDesign and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET)
متن کامل
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کامل