Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents
- URL: http://arxiv.org/abs/2405.18958v2
- Date: Thu, 31 Oct 2024 10:36:04 GMT
- Title: Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents
- Authors: Léonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard,
- Abstract summary: We present a game-based framework for the study of fairness protocols.
It is based on the notion of strong secure equilibria, and leverages the conceptual and algorithmic toolbox of game theory.
- Score: 0.6990493129893112
- License:
- Abstract: Fairness is a desirable and crucial property of many protocols that handle, for instance, exchanges of message. It states that if at least one agent engaging in the protocol is honest, then either the protocol will unfold correctly and fulfill its intended goal for all participants, or it will fail for everyone. In this work, we present a game-based framework for the study of fairness protocols, that does not define a priori an attacker model. It is based on the notion of strong secure equilibria, and leverages the conceptual and algorithmic toolbox of game theory. In the case of finite games, we provide decision procedures with tight complexity bounds for determining whether a protocol is immune to nefarious attacks from a coalition of participants, and whether such a protocol could exist based on the underlying graph structure and objectives.
Related papers
- Games for AI Control: Models of Safety Evaluations of AI Deployment Protocols [52.40622903199512]
This paper introduces AI-Control Games, a formal decision-making model of the red-teaming exercise as a multi-objective, partially observable game.
We apply our formalism to model, evaluate and synthesise protocols for deploying untrusted language models as programming assistants.
arXiv Detail & Related papers (2024-09-12T12:30:07Z) - Protocols for Quantum Weak Coin Flipping [0.1499944454332829]
Weak coin flipping is an important cryptographic primitive.
We give exact constructions of related unitary operators.
We illustrate the construction of explicit weak coin flipping protocols.
arXiv Detail & Related papers (2024-02-24T16:52:54Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Provably Secure Commitment-based Protocols over Unauthenticated Channels [0.0]
We build a theoretic security framework to cover protocols whose characteristics may not always concur with existing models for authenticated exchanges.
We propose a number of Commitment-based protocols to establish a shared secret between two parties, and study their resistance over unauthenticated channels.
This means analyzing the security robustness of the protocol itself, and its robustness against Man-in-the-Middle attacks.
arXiv Detail & Related papers (2023-07-28T10:35:35Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Single-qubit loss-tolerant quantum position verification protocol secure
against entangled attackers [0.0]
We study the exact loss-tolerance of the most popular protocol for QPV, which is based on BB84 states.
We show how these results transfer to the variant protocol which combines $n$ bits of classical information with a single qubit.
arXiv Detail & Related papers (2022-12-07T14:39:56Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Formalizing the Problem of Side Effect Regularization [81.97441214404247]
We propose a formal criterion for side effect regularization via the assistance game framework.
In these games, the agent solves a partially observable Markov decision process.
We show that this POMDP is solved by trading off the proxy reward with the agent's ability to achieve a range of future tasks.
arXiv Detail & Related papers (2022-06-23T16:36:13Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses [0.0]
We propose the first computational security model considering superposition attacks for multiparty protocols.
We show that our new security model is satisfiable by proving the security of the well-known One-Time-Pad protocol.
We use this newly imparted knowledge to construct the first concrete protocol for Secure Two-Party Computation that is resistant to superposition attacks.
arXiv Detail & Related papers (2020-07-01T18:00:54Z) - Composable Security for Multipartite Entanglement Verification [3.4806267677524896]
We present a composably secure protocol allowing $n$ parties to test an entanglement generation resource controlled by a possibly dishonest party.
The test consists only in local quantum operations and authenticated classical communication once a state is shared among them.
Our protocol can typically be used as a subroutine in a Quantum Internet, to securely share a GHZ state among the network before performing a communication or computation protocol.
arXiv Detail & Related papers (2020-04-16T14:33:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.