On Honesty in Sovereign Information Sharing
Abstract
We study the following problem in a sovereign information-sharing setting: How to ensure that the individual participants, driven solely by self-interest, will behave honestly, even though they can benefit from cheating. This benefit comes from learning more than necessary private information of others or from preventing others from learning the necessary information. We take a game-theoretic approach and design a game (strategies and payoffs) that models this kind of interactions. We show that if nobody is punished for cheating, rational participants will not behave honestly. Observing this, our game includes an auditing device that periodically checks the actions of the participants and penalizes inappropriate behavior. In this game we give conditions under which there exists a unique equilibrium (stable rational behavior) in which every participant provides truthful information. The auditing device preserves the privacy of the data of the individual participants. We also quantify the relationship between the frequency of auditing and the amount of punishment in terms of gains and losses from cheating.
Keywords
Nash Equilibrium Oblivious Transfer Check Frequency Secure Function Evaluation Honest BehaviorPreview
Unable to display preview. Download preview PDF.
References
- 1.Agrawal, R., Evfimievski, A.V., Srikant, R.: Information sharing across private databases. In: SIGMOD (2003)Google Scholar
- 2.Clarke, D., Devadas, S., van Dijk, M., Gassend, B., Suh, G.E.: Incremental multiset hash functions and their application to memory integrity checking. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 188–207. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 3.Clifton, C., Kantarcioglu, M., Lin, X., Vaidya, J., Zhu, M.: Tools for privacy preserving distributed data mining. SIGKDD Explorations 4(2), 28–34 (2003)CrossRefGoogle Scholar
- 4.Ferguson, T., Melolidakis, C.: On the inspection game. Naval Research Logistics 45 (1998)Google Scholar
- 5.Ferguson, T., Melolidakis, C.: Games with finite resources. International Journal on Game Theory 29 (2000)Google Scholar
- 6.Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)CrossRefGoogle Scholar
- 7.Goldreich, O.: Foundations of Cryptography, volume 2: Basic Applications, May 2004. Cambridge University Press, Cambridge (2004)Google Scholar
- 8.Huberman, B.A., Franklin, M., Hogg, T.: Enhancing privacy and trust in electronic communities. In: Proc. of the 1st ACM Conference on Electronic Commerce, Denver, Colorado (November 1999)Google Scholar
- 9.Corporation, I.B.M.: IBM 4758 Models 2 and 23 PCI cryptographic coprocessor (2004)Google Scholar
- 10.Kearns, M., Ortiz, L.E.: Algorithms for interdependent security games. In: NIPS (2004)Google Scholar
- 11.Kearns, M.J., Mansour, Y.: Efficient Nash computation in large population games with bounded influence. In: UAI (2002)Google Scholar
- 12.Kleinberg, J., Papadimitriou, C., Raghavan, P.: On the value of private information. In: 8th Conference on Theoretical Aspects of Rationality and Knowledge (2001)Google Scholar
- 13.Kunreuther, H., Heal, G.: Interdependent security. Journal of Risk and Uncertainty (2002)Google Scholar
- 14.Maschler, M.: A price leadership method for solving the inspector’s non-constantsum game. Princeton econometric research program (1963)Google Scholar
- 15.Monderer, D., Shapley, L.S.: Potential games. Games and Economic Behavior, 14 (1996)Google Scholar
- 16.Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proc. of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms, Washington DC, USA, pp. 448–457 (January 2001)Google Scholar
- 17.Osborne, M., Rubinstein, A.: A course in game theory. MIT Press, Cambridge (1994)zbMATHGoogle Scholar
- 18.Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Transactions on Information and System Security 6(3), 365–403 (2003)CrossRefGoogle Scholar
- 19.Rosenthal, R.W.: A class of games possessing pure-strategy Nash equilibria. International Journal of Game Theory (1973)Google Scholar
- 20.Vila, T., Greenstadt, R., Molnar, D.: Why we can’t be bothered to read privacy policies: Models of privacy economics as a lemons market. In: Second International Workshop on Economics and Information Security (2003)Google Scholar
- 21.von Stengel, B.: Recursive inspection games. Technical Report S-9106, University of the Federal Armed Forces, Munich (1991)Google Scholar
- 22.Zhang, N., Zhao, W.: Distributed privacy preserving information sharing. In: VLDB (2005)Google Scholar