Rational Protocols
نویسنده
چکیده
Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology. Users choose their security technology according to their incentives: if there is no loss or no threat, be it real or perceived, then they don’t care about investing in new protection methods (users may be individuals or corporations, they behave similarly in this respect). Hence, the adoption of information security technology has largely been driven by the real and perceived threats. One can observe this behavior in many cases [1, 5]. The deployment of data encryption for storage solutions in the recent years is a good example. Transparent encryption for a file system has first been demonstrated almost 20 years ago. The required methods have been around for much longer, it only takes standard block ciphers or stream ciphers and simple public-key methods for key management (that are not even used often). But it was new regulations (for example, the Sarbanes-Oxley Act or California SB 1386) and some highly visible security breaches starting in 2002 that triggered their widespread deployment. Nowadays every vendor in the storage market offers encryption for its products and many file systems come with integrated encryption.
منابع مشابه
Nature-Inspired Synthesis of Rational Protocols
Rational cryptography is an emerging field which combines aspects traditionally related to security with concepts described in economic theoretical frameworks. For example, it applies game theory concepts to address security problems arising when executing cryptographic protocols. The aim is to replace the assumption of a worst–case attacker by the notion of rational agents that try to maximize...
متن کاملA formal model of rational exchange and its application to the analysis of Syverson's protocol
We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network that they use to communicate with each other. Within this model, we give a formal definition for rational exchange and various other properties o...
متن کاملRational Exchange - A Formal Model Based on Game Theory
We introduce game theory as a formal framework in which exchange protocols can be modeled and their properties can be studied. We use this framework to give a formal deenition for rational exchange relating it to the concept of Nash equilibrium in games. In addition, we study the relationship between rational exchange and fair exchange. We prove that fair exchange implies rational exchange, but...
متن کاملRisk Balance in Exchange Protocols
We study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced risks on the participants. We also present a risk-balanced protocol for fair confidential secret comparison.
متن کاملBAR Games
This paper describes a general methodology for simplifying the design and analysis of BAR protocols. BAR protocols allow the participation of Byzantine, Altruistic, and Rational players. Because BAR protocols tolerate both arbitrary behaviors by some nodes and selfish behavior by the rest, they are appropriate for service and applications spanning multiple administrative domains. We focus our a...
متن کاملRevisiting Secure Two-Party Computation with Rational Players
A seminal result of Cleve (STOC 1986) showed that fairness, in general, is impossible to achieve in case of two-party computation if one of them is malicious. Later, Gordon et al. (STOC 2008) observed that there exist two distinct classes of functions for which fairness can be achieved. One is any function without an embedded XOR, and the other one is a particular function containing an embedde...
متن کامل