Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2600057.2602903acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
abstract

Cryptographically blinded games: leveraging players' limitations for equilibria and profit

Published: 01 June 2014 Publication History

Abstract

In this work we apply methods from cryptography to enable mutually distrusting players to implement broad classes of mediated equilibria of strategic games without trusted mediation. Our implementation uses a pre-play 'cheap talk' phase, consisting of non- binding communication between players prior to play in the original game. In the cheap talk phase, the players run a secure multi-party computation protocol to sample from an equilibrium of a "cryptographically blinded" version of the game, in which actions are encrypted.
Coarse correlated equilibrium. Coarse correlated equilibria (CCE) are a generalization of correlated equilibria (CE), invoking a notion of commitment. Suppose a mediator samples an action profile a from a distribution α. We say α is a CCE if no player has incentive not to "promise" in advance -- before seeing his advice ai -- to play according to the advice, if he believes that all other players will commit to do the same. Note that players who do not commit will not see the advice at all, and hence must play an independent strategy.
In this paper, we address the following question:
How can the players of a strategic game implement any CCE via (cryptographic) pre-play communication without trusting each other or a mediator?
In the computational setting, we give an implementation for general strategic games, in the form of an extended game comprising a cryptographic protocol in the pre-play phase, which securely samples an action profile for a "cryptographically blinded" version of the game. The blinded game's action space consists of encryptions of the original game's actions. Our implementation has the strong property that any computational CCE of the original game corresponds to a payoff-equivalent Nash equilibrium of the extended game. Furthermore, it achieves strategic equivalence, in that every computational Nash equilibrium of the extended game corresponds to a computational CCE of the original game.
In the information-theoretic setting, we give an implementation for strategic games with four or more players, using a similar cryptographically blinded pre-play phase given pairwise communication channels. This also achieves strategic equivalence. Both the restriction to four or more players and the need for a stronger communication model are unavoidable in this setting, as shown by impossibility results of [Bárány 1992; Ben-Or et al. 1988; Pease et al. 1980; Aumann and Hart 2003].
Relation to prior work. The pre-play literature considers the problem of implementing equilibria without mediation. Our work generalizes that of [Bárány 1992] in the information-theoretic setting and [Dodis et al. 2000] in the computational setting. It has long been recognized that the possibility to commit to strategies in advance can increase payoffs achievable in a game, starting with [von Stackelberg 1934]; in this work, we achieve the payoffs of CCE without resorting to the usual assumption of binding contracts. Our results are achieved using a very weak (and necessary [Hubáček et al. 2013]) notion of mediation, where the mediator's actions are publicly verifiable, and moreover the mediator's output does not affect players' strategic choices.

References

[1]
Robert J. Aumann and Sergiu Hart. 2003. Long cheap talk. Econometrica 71, 6 (2003), 1619--1660.
[2]
Imre Bárány. 1992. Fair distribution protocols or how the players replace fortune. Mathematics of Operations Research 17, 2 (1992), 327--340.
[3]
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, 1--10.
[4]
Yevgeniy Dodis, Shai Halevi, and Tal Rabin. 2000. A cryptographic solution to a game theoretic problem. In CRYPTO (Lecture Notes in Computer Science), Mihir Bellare (Ed.), Vol. 1880. Springer, 112--130.
[5]
Pavel Hubáček, Jesper Buus Nielsen, and Alon Rosen. 2013. Limits on the power of cryptographic cheap talk. In CRYPTO (1) (Lecture Notes in Computer Science), Ran Canetti and Juan A. Garay (Eds.), Vol. 8042. Springer, 277--297.
[6]
Marshall Pease, Robert Shostak, and Leslie Lamport. 1980. Reaching agreement in the presence of faults. Journal of the ACM (JACM) 27, 2 (1980), 228--234.
[7]
Heinrich von Stackelberg. 1934. Marktform und Gleichgewicht.-Wien & Berlin: Springer 1934. VI, 138 S. 8. J. Springer.

Cited By

View all
  • (2016)Computational Extensive-Form GamesProceedings of the 2016 ACM Conference on Economics and Computation10.1145/2940716.2940733(681-698)Online publication date: 21-Jul-2016

Index Terms

  1. Cryptographically blinded games: leveraging players' limitations for equilibria and profit

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      EC '14: Proceedings of the fifteenth ACM conference on Economics and computation
      June 2014
      1028 pages
      ISBN:9781450325653
      DOI:10.1145/2600057
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 June 2014

      Check for updates

      Author Tags

      1. blinded games
      2. cheap talk
      3. coarse correlated equilibria
      4. cryptographic protocols
      5. encryption
      6. multi-party computation
      7. power of commitment

      Qualifiers

      • Abstract

      Funding Sources

      Conference

      EC '14
      Sponsor:
      EC '14: ACM Conference on Economics and Computation
      June 8 - 12, 2014
      California, Palo Alto, USA

      Acceptance Rates

      EC '14 Paper Acceptance Rate 80 of 290 submissions, 28%;
      Overall Acceptance Rate 664 of 2,389 submissions, 28%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)Computational Extensive-Form GamesProceedings of the 2016 ACM Conference on Economics and Computation10.1145/2940716.2940733(681-698)Online publication date: 21-Jul-2016

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media