TY - CONF
T1 - Bridging game theory and cryptography: recent results and future directions
T2 - Proceedings of the 5th conference on Theory of cryptography
Y1 - 2008
A1 - Katz, Jonathan
AB - Motivated by the desire to develop more realistic models of, and protocols for, interactions between mutually distrusting parties, there has recently been significant interest in combining the approaches and techniques of game theory with those of cryptographic protocol design. Broadly speaking, two directions are currently being pursued: Applying cryptography to game theory: Certain game-theoretic equilibria are achievable if a trusted mediator is available. The question here is: to what extent can this mediator be replaced by a distributed cryptographic protocol run by the parties themselves? Applying game-theory to cryptography: Traditional cryptographic models assume some honest parties who faithfully follow the protocol, and some arbitrarily malicious players against whom the honest players must be protected. Game-theoretic models propose instead that all players are simply self-interested (i.e., rational), and the question then is: how can we model and design meaningful protocols for such a setting? In addition to surveying known results in each of the above areas, I suggest some new definitions along with avenues for future research.
JA - Proceedings of the 5th conference on Theory of cryptography
T3 - TCC'08
PB - Springer-Verlag
CY - Berlin, Heidelberg
SN - 3-540-78523-X, 978-3-540-78523-1
UR - http://dl.acm.org/citation.cfm?id=1802614.1802635
ER -