Skip to main content

2020 | OriginalPaper | Buchkapitel

11. Cryptographic Games

verfasst von : Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu

Erschienen in: Cyber-Security in Critical Infrastructures

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The term “game” has substantially different meanings within the security area, depending on whether we speak about cryptographic security in particular, or system security in a more general setting that includes quantitative security with help of game theory. Game theory and cryptography are, however, of mutual value for each other, since game theory can help designing self-enforcing security of cryptographic protocols, and cryptography contributes invaluable mechanisms to implement games for security. This chapter introduces both ideas, being rational cryptography for the design of protocols that use rationality to incentivize players to follow faithfully, but also addresses the classical security goals like confidentiality, integrity, availability and authenticity by describing security games with quantitative and unconditional security guarantees. The chapter closes with a connection between network design for security and the P/NP question whose discovery is made with help from game theory.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alwen J, Cachin C, Nielsen JB, Pereira O, Sadeghi AR, Schomakers B, Shelat A, Visconti I (2007) D.PROVI.7 summary report on rational cryptographic protocols (01 Jan 2007), Mar Alwen J, Cachin C, Nielsen JB, Pereira O, Sadeghi AR, Schomakers B, Shelat A, Visconti I (2007) D.PROVI.7 summary report on rational cryptographic protocols (01 Jan 2007), Mar
3.
Zurück zum Zitat Buchmann J, Ding J (eds) (2008) Post-quantum cryptography. Lecture notes in computer science 5299. Springer, Cham Buchmann J, Ding J (eds) (2008) Post-quantum cryptography. Lecture notes in computer science 5299. Springer, Cham
4.
Zurück zum Zitat Campanelli M, Gennaro R (2017) Efficient rational proofs for space bounded computations. In: Rass S, An B, Kiekintveld C, Fang F, Schauer S (eds) Decision and game theory for security, pp 53–73. Springer International Publishing, ChamMATHCrossRef Campanelli M, Gennaro R (2017) Efficient rational proofs for space bounded computations. In: Rass S, An B, Kiekintveld C, Fang F, Schauer S (eds) Decision and game theory for security, pp 53–73. Springer International Publishing, ChamMATHCrossRef
5.
Zurück zum Zitat Carter JL, Wegman MN (1981) Universal classes of hashing functions. J Comput Syst Sci 22:265–279MATHCrossRef Carter JL, Wegman MN (1981) Universal classes of hashing functions. J Comput Syst Sci 22:265–279MATHCrossRef
8.
Zurück zum Zitat Elliott C, Colvin A, Pearson D, Pikalo O, Schlafer J, Yeh H (2005) Current status of the DARPA quantum network. ArXiv:quant-ph/0503058v2 Elliott C, Colvin A, Pearson D, Pikalo O, Schlafer J, Yeh H (2005) Current status of the DARPA quantum network. ArXiv:quant-ph/0503058v2
9.
Zurück zum Zitat Fitzi M, Franklin MK, Garay J, Vardhan SH (2007) Towards optimal and efficient perfectly secure message transmission. In: TCC, LNCS, vol 4392. Springer, pp 311–322 Fitzi M, Franklin MK, Garay J, Vardhan SH (2007) Towards optimal and efficient perfectly secure message transmission. In: TCC, LNCS, vol 4392. Springer, pp 311–322
12.
Zurück zum Zitat Gennaro R, Rabin MO, Rabin T (1998) Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proceedings of the seventeenth annual ACM symposium on principles of distributed computing. ACM, New York, pp 101–111. https://doi.org/10.1145/277697.277716 CrossRef Gennaro R, Rabin MO, Rabin T (1998) Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Proceedings of the seventeenth annual ACM symposium on principles of distributed computing. ACM, New York, pp 101–111. https://​doi.​org/​10.​1145/​277697.​277716 CrossRef
15.
Zurück zum Zitat Goldreich O (2003) Foundations of cryptography 1, 2. Cambridge University Press, Cambridge Goldreich O (2003) Foundations of cryptography 1, 2. Cambridge University Press, Cambridge
16.
Zurück zum Zitat Goldreich O, Goldwasser S (1998) On the possibility of basing cryptography on the assumption that P=NP (01 Jan 1998) Goldreich O, Goldwasser S (1998) On the possibility of basing cryptography on the assumption that P=NP (01 Jan 1998)
18.
Zurück zum Zitat Helleseth T, Johansson T (1996) Universal hash functions from exponential sums over finite fields and Galois rings. In: Advances in cryptology CRYPTO ’96. Springer, Berlin, pp 31–44CrossRef Helleseth T, Johansson T (1996) Universal hash functions from exponential sums over finite fields and Galois rings. In: Advances in cryptology CRYPTO ’96. Springer, Berlin, pp 31–44CrossRef
19.
22.
Zurück zum Zitat Kodialam M, Lakshman TV (2003) Detecting network intrusions via sampling: a game theoretic approach. In: IEEE INFOCOM, vol 3. San Francisco, pp 1880–1889 Kodialam M, Lakshman TV (2003) Detecting network intrusions via sampling: a game theoretic approach. In: IEEE INFOCOM, vol 3. San Francisco, pp 1880–1889
23.
24.
Zurück zum Zitat Menezes A, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press LLC, Boca RatonMATH Menezes A, van Oorschot PC, Vanstone SA (1997) Handbook of applied cryptography. CRC Press LLC, Boca RatonMATH
25.
Zurück zum Zitat Michiardi P, Molva R Game theoretic analysis of security in mobile ad hoc networks (01 Jan 2002) Michiardi P, Molva R Game theoretic analysis of security in mobile ad hoc networks (01 Jan 2002)
26.
Zurück zum Zitat Nevelsteen W, Preneel B (1999) Software performance of universal hash functions. In: EUROCRYPT’99, LNCS 1592. Springer, pp 24–41 Nevelsteen W, Preneel B (1999) Software performance of universal hash functions. In: EUROCRYPT’99, LNCS 1592. Springer, pp 24–41
29.
Zurück zum Zitat Rabin T, Ben-Or M (1989) Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM symposium on theory of computing, STOC ’89. ACM, New York, pp 73–85 Rabin T, Ben-Or M (1989) Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the twenty-first annual ACM symposium on theory of computing, STOC ’89. ACM, New York, pp 73–85
31.
Zurück zum Zitat Rass S (2014) Complexity of network design for private communication and the P-vs-NP question. Int J Adv Comput Sci Appl 5(2):148–157 Rass S (2014) Complexity of network design for private communication and the P-vs-NP question. Int J Adv Comput Sci Appl 5(2):148–157
32.
Zurück zum Zitat Rass S, König S (2012) Turning quantum cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1 & 2):22–33 Rass S, König S (2012) Turning quantum cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1 & 2):22–33
34.
Zurück zum Zitat Rass S, Schartner P (2010) Multipath authentication without shared secrets and with applications in quantum networks. In: Proceedings of the international conference on security and management (SAM), vol 1. CSREA Press, pp 111–115 Rass S, Schartner P (2010) Multipath authentication without shared secrets and with applications in quantum networks. In: Proceedings of the international conference on security and management (SAM), vol 1. CSREA Press, pp 111–115
35.
Zurück zum Zitat Rass S, Schartner P (2011) Information-leakage in hybrid randomized protocols. In: Lopez J, Samarati P (eds) Proceedings of the international conference on security and cryptography (SECRYPT). SciTePress – Science and Technology Publications, pp 134–143 Rass S, Schartner P (2011) Information-leakage in hybrid randomized protocols. In: Lopez J, Samarati P (eds) Proceedings of the international conference on security and cryptography (SECRYPT). SciTePress – Science and Technology Publications, pp 134–143
38.
Zurück zum Zitat Rass S, Slamanig D (2013) Cryptography for security and privacy in cloud computing. Artech House, Boston Rass S, Slamanig D (2013) Cryptography for security and privacy in cloud computing. Artech House, Boston
40.
Zurück zum Zitat Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444CrossRef Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441–444CrossRef
42.
43.
Metadaten
Titel
Cryptographic Games
verfasst von
Stefan Rass
Stefan Schauer
Sandra König
Quanyan Zhu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-46908-5_11

Premium Partner