How fair is your protocol? A utility-based approach to protocol optimality

Juan Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security of distributed cryptographic protocols usually requires privacy (inputs of the honest parties remain hidden), correctness (the adversary cannot improperly affect the outcome), and fairness (if the adversary learns the output, all honest parties do also). Cleve's seminal result (STOC '86) implies that satisfying these properties simultaneously is impossible in the presence of dishonest majorities, and led to several proposals for relaxed notions of fairness. While these works also suggest completeness results (i.e., the ability to design protocols which achieve their fairness notion), their assessment is typically of an all-or-nothing nature. In this work we put forth a new approach for defining relaxed fairness guarantees that allows for a quantitative comparison between protocols with regard to the level of fairness they achieve. The basic idea is to use an appropriate utility function to express the preferences of an adversary who wants to violate fairness. We also show optimal protocols with respect to our notion, in both the two-party and multiparty settings.

Original languageEnglish
Title of host publicationProceedings of the 2015 ACM Symposium on Principles of Distributed Computing
PublisherACM Association for Computing Machinery
Pages281-290
Number of pages10
ISBN (Electronic)9781450336178
DOIs
Publication statusPublished - 21 Jul 2015
EventACM Symposium on Principles of Distributed Computing - Donostia-San Sebastian, Spain
Duration: 21 Jul 201523 Jul 2015
https://www.podc.org/podc2015/

Symposium

SymposiumACM Symposium on Principles of Distributed Computing
Abbreviated titlePODC 2015
Country/TerritorySpain
CityDonostia-San Sebastian
Period21/07/1523/07/15
Internet address

Keywords / Materials (for Non-textual outputs)

  • Security
  • Theory

Fingerprint

Dive into the research topics of 'How fair is your protocol? A utility-based approach to protocol optimality'. Together they form a unique fingerprint.

Cite this