{"title":"Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents","authors":"Ivan Geffner, Joseph Y. Halpern","doi":"https://dl.acm.org/doi/10.1145/3578579","DOIUrl":null,"url":null,"abstract":"<p>Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a <i>(k, t)-robust equilibrium</i> for <i>n</i> players and a trusted mediator can be implemented without the mediator as long as <i>n</i> > 4(<i>k+t</i>), where an equilibrium is (<i>k, t</i>)-robust if, roughly speaking, no coalition of <i>t</i> players can decrease the payoff of any of the other players, and no coalition of <i>k</i> players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if <i>n</i> ≤ 4(<i>k+t</i>) there exist (<i>k, t</i>)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (<i>k, t</i>)-robust mediators seems closely related to implementing asynchronous multiparty (<i>k+t</i>)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (<i>k+t</i>)-secure computation, which we call <i>(<i>k+t</i>)-strict secure computation</i>, to implementing (<i>k, t</i>)-robust mediators. We prove the desired lower bound by showing that there are functions on <i>n</i> variables that cannot be (<i>k+t</i>)-strictly securely computed if <i>n</i> ≤ 4(<i>k+t</i>). This also provides a simple alternative proof for the well-known lower bound of 4<i>t</i>+1 on asynchronous secure computation in the presence of up to <i>t</i> malicious agents [4, 8, 10].</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"19 1","pages":""},"PeriodicalIF":2.3000,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the ACM","FirstCategoryId":"94","ListUrlMain":"https://doi.org/https://dl.acm.org/doi/10.1145/3578579","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].
期刊介绍:
The best indicator of the scope of the journal is provided by the areas covered by its Editorial Board. These areas change from time to time, as the field evolves. The following areas are currently covered by a member of the Editorial Board: Algorithms and Combinatorial Optimization; Algorithms and Data Structures; Algorithms, Combinatorial Optimization, and Games; Artificial Intelligence; Complexity Theory; Computational Biology; Computational Geometry; Computer Graphics and Computer Vision; Computer-Aided Verification; Cryptography and Security; Cyber-Physical, Embedded, and Real-Time Systems; Database Systems and Theory; Distributed Computing; Economics and Computation; Information Theory; Logic and Computation; Logic, Algorithms, and Complexity; Machine Learning and Computational Learning Theory; Networking; Parallel Computing and Architecture; Programming Languages; Quantum Computing; Randomized Algorithms and Probabilistic Analysis of Algorithms; Scientific Computing and High Performance Computing; Software Engineering; Web Algorithms and Data Mining