[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1807406.1807497acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbqgtConference Proceedingsconference-collections
research-article

Collusion-free protocols

Published: 14 May 2010 Publication History

Abstract

Consider the clever cheating that occurred during an FCC spectrum auction in 1995 (see Cramton and J. Schwartz '02 for a history). Auction rules forbade companies from openly colluding to divide the spectrum cheaply; nonetheless, the major players circumvented the rules by using the least significant digits of their public messages to coordinate their overall bidding strategies. In other words, these parties used the auction protocol itself to cheat.
Standard notions of security for cryptographic protocols do not prevent this type of cheating. In this talk, we propose the idea of collusion-free protocols. Such protocols do not create any new opportunities---such as using the protocol messages and headers themselves---for malicious participants to coordinate their cheating during the execution of the protocol. We discuss both positive and negative results regarding this notion by showing that it is possible to construct such protocols but special communication assumptions are provably necessary. The conceptual barrier to achieving this novel security property is captured in the following paradox: it is widely acknowledged that players must use randomness to pick their messages in any secure protocol, but the presence of randomized messages also enables perfect steganography and thus perfect collusion.
We give an overview of two conceptually different approaches to overcome this paradox. The first method is based on the concept of verifiable determinism. This is a way to organize communication so that a player's next message is unpredictable, but once the message has been sent, everyone can verify that it was the one-and-only such message that an honest player could have sent. As a result, steganography becomes impossible. The second method takes an opposite approach: players generate arbitrary messages but send them to each other via a mediator who "re-randomizes"' the messages to eliminate steganographic channels. The goal is to design protocols where collusion-freeness is guaranteed as long as the mediator is honest, while standard security guarantees hold if the mediator is dishonest. This new approach enables us to use a less exotic communication channel to construct protocols that achieve a strong collusion-free property.
This talk is based on 4 papers with the following set of coauthors: Matt Lepinski and Silvio Micali, Joel Alwen and Ivan Visconti, and Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, and Visconti.

Cited By

View all
  • (2024)Secret Sharing with SnitchingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690296(840-853)Online publication date: 2-Dec-2024

Index Terms

  1. Collusion-free protocols

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    BQGT '10: Proceedings of the Behavioral and Quantitative Game Theory: Conference on Future Directions
    May 2010
    155 pages
    ISBN:9781605589190
    DOI:10.1145/1807406
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Eller College of Management

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 May 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    BQGT '10
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Secret Sharing with SnitchingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690296(840-853)Online publication date: 2-Dec-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media