We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of size up to k can do better, even if the whole coalition defects. We show that such k-resilient Nash equilibria exist for secret sharing and multiparty com-putation, provided that players prefer to get the information than not to get it. Our results hold even if there are only 2 players, so we can do multiparty computation with only two rational agents. We extend our results so that they hold even in the presence of up to t players with “unexpected” utilities. Finally, we show that our techniques can be used to simulate games with mediators by games without media-tors
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
This thesis contains three main contributions as follows. First, we propose an information theoretic...
We consider $k$-resilient sequential equilibria, strategy profiles where no player in a coalition of...
ABSTRACT We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of ...
We provide a general construction that converts any rational secret-sharing protocol to a protocol w...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Abstract—In game theory, a trusted mediator acting on behalf of the players can enable the attainmen...
In order to prevent any arbitrary subsets of coalition in rational secret sharing, we propose a new ...
We consider the classical secret sharing problem in the case where all agents are selfish but ration...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
Traditionally, work in distributed computing has divided the agents into "good guys" and "bad guys"....
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
Following [4] we extend and generalize the game-theoretic model of distributed computing, identifyin...
ABSTRACT We consider the problems of secret sharing and multiparty computation, assuming that agents...
In this paper, we consider the problem of designing a resilient cooperative system from the perspect...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
This thesis contains three main contributions as follows. First, we propose an information theoretic...
We consider $k$-resilient sequential equilibria, strategy profiles where no player in a coalition of...
ABSTRACT We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of ...
We provide a general construction that converts any rational secret-sharing protocol to a protocol w...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Abstract—In game theory, a trusted mediator acting on behalf of the players can enable the attainmen...
In order to prevent any arbitrary subsets of coalition in rational secret sharing, we propose a new ...
We consider the classical secret sharing problem in the case where all agents are selfish but ration...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
Traditionally, work in distributed computing has divided the agents into "good guys" and "bad guys"....
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
Following [4] we extend and generalize the game-theoretic model of distributed computing, identifyin...
ABSTRACT We consider the problems of secret sharing and multiparty computation, assuming that agents...
In this paper, we consider the problem of designing a resilient cooperative system from the perspect...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
This thesis contains three main contributions as follows. First, we propose an information theoretic...
We consider $k$-resilient sequential equilibria, strategy profiles where no player in a coalition of...