Distributed protocols for leader election: A game-theoretic perspective
We do a game-theoretic analysis of leader election, under the assumption that each agent
prefers to have some leader than to have no leader at all. We show that it is possible to …
prefers to have some leader than to have no leader at all. We show that it is possible to …
TRAP: the bait of rational players to solve byzantine consensus
A Ranchal-Pedrosa, V Gramoli - Proceedings of the 2022 ACM on Asia …, 2022 - dl.acm.org
It is impossible to solve the Byzantine consensus problem in an open network of n
participants if only 2n/3 or less of them are correct. As blockchains need to solve consensus …
participants if only 2n/3 or less of them are correct. As blockchains need to solve consensus …
Coalition-safe equilibria with virtual payoffs
Consider a set of participants invited to execute a protocol Π. The protocol will incur some
cost to run while in the end (or at regular intervals), it will populate and update local …
cost to run while in the end (or at regular intervals), it will populate and update local …
Distributed computing building blocks for rational agents
Following [4] we extend and generalize the game-theoretic model of distributed computing,
identifying different utility functions that encompass different potential preferences of players …
identifying different utility functions that encompass different potential preferences of players …
Distributed protocols for leader election: A game-theoretic perspective
We do a game-theoretic analysis of leader election, under the assumption that each agent
prefers to have some leader than no leader at all. We show that it is possible to obtain a fair …
prefers to have some leader than no leader at all. We show that it is possible to obtain a fair …
m-stability: Threshold security meets transferable utility
Use of game theory and mechanism design in cloud security is a well-studied topic. When
applicable, it has the advantages of being efficient and simple compared to cryptography …
applicable, it has the advantages of being efficient and simple compared to cryptography …
Fair leader election for rational agents in asynchronous rings and networks
A Yifrach, Y Mansour - Proceedings of the 2018 ACM Symposium on …, 2018 - dl.acm.org
We study a game theoretic model where a coalition of processors might collude to bias the
outcome of the protocol, where we assume that the processors always prefer any legitimate …
outcome of the protocol, where we assume that the processors always prefer any legitimate …
Rational agreement in the presence of crash faults
A Ranchal-Pedrosa, V Gramoli - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Blockchain systems need to solve consensus despite the presence of rational users and
failures. The notion of (k,t)-robustness is key to derive impossibility results with k rational …
failures. The notion of (k,t)-robustness is key to derive impossibility results with k rational …
Cryptographic rational secret sharing schemes over general networks
We propose cryptographic rational secret sharing protocols over general networks. In a
general network, the dealer may not have direct connections to each player, and players …
general network, the dealer may not have direct connections to each player, and players …
Cheating by duplication: Equilibrium requires global knowledge
The question of what global information must distributed rational agents a-priori know about
the network in order for equilibrium to be possible is researched here. Until now, distributed …
the network in order for equilibrium to be possible is researched here. Until now, distributed …