在具有理性和恶意代理的异步系统中实现中介的下限

IF 2.3 2区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Journal of the ACM Pub Date : 2023-03-25 DOI:https://dl.acm.org/doi/10.1145/3578579
Ivan Geffner, Joseph Y. Halpern
{"title":"在具有理性和恶意代理的异步系统中实现中介的下限","authors":"Ivan Geffner, Joseph Y. Halpern","doi":"https://dl.acm.org/doi/10.1145/3578579","DOIUrl":null,"url":null,"abstract":"<p>Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a <i>(k, t)-robust equilibrium</i> for <i>n</i> players and a trusted mediator can be implemented without the mediator as long as <i>n</i> &gt; 4(<i>k+t</i>), where an equilibrium is (<i>k, t</i>)-robust if, roughly speaking, no coalition of <i>t</i> players can decrease the payoff of any of the other players, and no coalition of <i>k</i> players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if <i>n</i> ≤ 4(<i>k+t</i>) there exist (<i>k, t</i>)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (<i>k, t</i>)-robust mediators seems closely related to implementing asynchronous multiparty (<i>k+t</i>)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (<i>k+t</i>)-secure computation, which we call <i>(<i>k+t</i>)-strict secure computation</i>, to implementing (<i>k, t</i>)-robust mediators. We prove the desired lower bound by showing that there are functions on <i>n</i> variables that cannot be (<i>k+t</i>)-strictly securely computed if <i>n</i> ≤ 4(<i>k+t</i>). This also provides a simple alternative proof for the well-known lower bound of 4<i>t</i>+1 on asynchronous secure computation in the presence of up to <i>t</i> malicious agents [4, 8, 10].</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.3000,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents\",\"authors\":\"Ivan Geffner, Joseph Y. Halpern\",\"doi\":\"https://dl.acm.org/doi/10.1145/3578579\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a <i>(k, t)-robust equilibrium</i> for <i>n</i> players and a trusted mediator can be implemented without the mediator as long as <i>n</i> &gt; 4(<i>k+t</i>), where an equilibrium is (<i>k, t</i>)-robust if, roughly speaking, no coalition of <i>t</i> players can decrease the payoff of any of the other players, and no coalition of <i>k</i> players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if <i>n</i> ≤ 4(<i>k+t</i>) there exist (<i>k, t</i>)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (<i>k, t</i>)-robust mediators seems closely related to implementing asynchronous multiparty (<i>k+t</i>)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (<i>k+t</i>)-secure computation, which we call <i>(<i>k+t</i>)-strict secure computation</i>, to implementing (<i>k, t</i>)-robust mediators. We prove the desired lower bound by showing that there are functions on <i>n</i> variables that cannot be (<i>k+t</i>)-strictly securely computed if <i>n</i> ≤ 4(<i>k+t</i>). This also provides a simple alternative proof for the well-known lower bound of 4<i>t</i>+1 on asynchronous secure computation in the presence of up to <i>t</i> malicious agents [4, 8, 10].</p>\",\"PeriodicalId\":50022,\"journal\":{\"name\":\"Journal of the ACM\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":2.3000,\"publicationDate\":\"2023-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of the ACM\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/https://dl.acm.org/doi/10.1145/3578579\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of the ACM","FirstCategoryId":"94","ListUrlMain":"https://doi.org/https://dl.acm.org/doi/10.1145/3578579","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

Abraham, Dolev, Geffner, and Halpern[1]证明了在异步系统中,只要n >4(k+t),其中均衡是(k, t)-鲁棒性,粗略地说,如果t个参与者的联盟不能减少其他参与者的收益,并且k个参与者的联盟不能通过偏离来增加他们的收益。我们证明了这个界是紧的,即如果n≤4(k+t),存在(k, t)个具有中介的鲁棒均衡,且不能由参与人单独实现。尽管实现(k, t)健壮的中介器似乎与实现异步多方(k+t)安全计算密切相关[6],但据我们所知,没有已知的从一个问题到另一个问题的直接简化。然而,我们证明了从稍微弱一点的(k+t)安全计算的概念(我们称之为(k+t)严格安全计算)到实现(k, t)鲁棒中介的非平凡简化。我们通过证明n个变量上的函数不能是(k+t)——当n≤4(k+t)时严格安全计算,证明了期望的下界。这也为异步安全计算中存在多达t个恶意代理时众所周知的4t+1下界提供了一个简单的替代证明[4,8,10]。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents

Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of the ACM
Journal of the ACM 工程技术-计算机:理论方法
CiteScore
7.50
自引率
0.00%
发文量
51
审稿时长
3 months
期刊介绍: The best indicator of the scope of the journal is provided by the areas covered by its Editorial Board. These areas change from time to time, as the field evolves. The following areas are currently covered by a member of the Editorial Board: Algorithms and Combinatorial Optimization; Algorithms and Data Structures; Algorithms, Combinatorial Optimization, and Games; Artificial Intelligence; Complexity Theory; Computational Biology; Computational Geometry; Computer Graphics and Computer Vision; Computer-Aided Verification; Cryptography and Security; Cyber-Physical, Embedded, and Real-Time Systems; Database Systems and Theory; Distributed Computing; Economics and Computation; Information Theory; Logic and Computation; Logic, Algorithms, and Complexity; Machine Learning and Computational Learning Theory; Networking; Parallel Computing and Architecture; Programming Languages; Quantum Computing; Randomized Algorithms and Probabilistic Analysis of Algorithms; Scientific Computing and High Performance Computing; Software Engineering; Web Algorithms and Data Mining
期刊最新文献
Pure-Circuit: Tight Inapproximability for PPAD A Logical Approach to Type Soundness Query lower bounds for log-concave sampling Transaction Fee Mechanism Design Sparse Higher Order Čech Filtrations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1