Interleaving Cryptography and Mechanism Design The Case of Online - - PowerPoint PPT Presentation

interleaving cryptography and mechanism design
SMART_READER_LITE
LIVE PREVIEW

Interleaving Cryptography and Mechanism Design The Case of Online - - PowerPoint PPT Presentation

Interleaving Cryptography and Mechanism Design The Case of Online Auctions Edith Elkind and Helger Lipmaa Princeton University and Helsinki University of Technology FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design,


slide-1
SLIDE 1

Interleaving Cryptography and Mechanism Design

The Case of Online Auctions

Edith Elkind and Helger Lipmaa

Princeton University and Helsinki University of Technology

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 1

slide-2
SLIDE 2

Outline of the Talk

  • Introduction and Motivations
  • Mechanism Design and Cryptographic Protocol Design
  • Online Auctions — Desiderata
  • New Cryptographic Mechanism

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 2

slide-3
SLIDE 3

Introduction and Motivations (I/III))

  • Auction: people say how much they can pay for an item
  • Used for nonstandard items where price depends on need
  • Many different mechanisms to conduct an auction:

⋆ English, Dutch, Vickrey, . . .

  • Every mechanism has some properties that make it good in some sit-

uation

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 3

slide-4
SLIDE 4

Introduction and Motivations (II/III))

  • Vickrey auctions: theoretically very good

⋆ One round, incentive-compatible, . . .

  • Rarely used in practice since

⋆ Security: ∗ Auctioneer can cheat, no privacy ⋆ Cognitive costs: ∗ One round thus people must know their valuations beforehand

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 4

slide-5
SLIDE 5

Introduction and Motivations (III/III)

  • Security solution: use crypto on top of a mechanism

⋆ I.e., take the existing mechanism + add a new cryptographic layer

  • Very common approach: dozens of cryptographic auction papers
  • This approach does not take into account cognitive costs
  • May be we could design a new mechanism that takes security and

cognitive cost into account from scratch?

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 5

slide-6
SLIDE 6

Mechanism Design

  • Individuals have some social or financial preferences

⋆ Individuals are usually assumed to be omnipotent, rational, knowl- edgeable etc

  • Mechanism: multi-party protocol with additional motivational ingredi-

ent: ⋆ Participating in the protocol should not be “bad” for anybody

  • Goal of mechanism design:

⋆ Honestly following the mechanism should maximize your utility function

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 6

slide-7
SLIDE 7

Mechanism Design

  • Typical mechanisms:

⋆ Auctions: ∗ English, Vickrey, Dutch, . . . ⋆ Voting: ∗ Plurality, STV, Borda, . . .

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 7

slide-8
SLIDE 8

Mechanism Design and Security

  • Privacy is a non-issue
  • Cheating for the purpose of damaging other participants is a non-

issue: ⋆ The participants are assumed to act solely so as to maximize their utility

  • Security issues in auctions:

⋆ Security against shills, jump bids, . . .

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 8

slide-9
SLIDE 9

Cryptographic Protocol Design

  • Multiple participants

⋆ No restrictions on their behavior

  • Every participant has a secret input, the goal is to compute a fixed

function of the inputs

  • Correctness: protocol must compute the output correctly
  • Privacy: inputs must stay secret

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 9

slide-10
SLIDE 10

Online Auctions

  • People use gadgets to conduct an auction mechanism

⋆ Still being in the same room (or not) as the auctioneer ⋆ E.g., using mobile phones in a last minute ticket auction

  • Using gadgets makes it possible to use cryptography, but also to de-

sign new mechanisms that people may be even do not understand

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 10

slide-11
SLIDE 11

Auction Desiderata

  • Pareto-efficiency or revenue maximization
  • Resource-effectiveness
  • Security against malicious auctioneer
  • Privacy
  • Minimal cognitive cost

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 11

slide-12
SLIDE 12

Example: Vickrey Auction

  • Sealed-bid: one round of bidding, the highest bidder gets the item for

the second highest bid

  • Good:

⋆ Pareto-efficient, round-effective

  • Bad:

⋆ No security against the auctioneer, no privacy, large cognitive costs

  • In some other mechanisms, you have much more rounds and thus less

cognitive costs, or some other tradeoffs

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 12

slide-13
SLIDE 13

Cryptographic Vickrey Auction

  • Bidders encrypt their inputs. The inputs are sent to “machinery” that

computes the second highest bid and the highest bidder

  • Different machineries:

⋆ Multi-party computation with n servers ∗ Privacy/correctness are guaranteed if 2/3 of the servers are cor- rect ⋆ 2 servers, correctness guaranteed if they do not collaborate

  • Eliminates security issues, still large cognitive costs

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 13

slide-14
SLIDE 14

CVA: Mechanism and Scheme

  • Mechanism design: defines the goals

⋆ Winner: highest bidder ⋆ Price: second highest bid ⋆ No intermediate bidding

  • Cryptography:

⋆ Takes care of privacy and correctness

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 14

slide-15
SLIDE 15

Tradeoffs

  • Cognitive costs vs round-effectiveness:

⋆ The more rounds, the more time the participants have to contem- plate on their actual valuation of the item (“common value model”)

  • Cognitive costs vs privacy:

⋆ The more information you get about the valuations of other bidders the more you know about your own

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 15

slide-16
SLIDE 16

Our contributions

  • Design a new cryptographic mechanism that takes security issues and

cognitive cost into account from the beginning

  • Mechanism has built in parameters

⋆ Tradeoffs between cognitive costs, security and effectiveness

  • Can prove surprising things: security against shills etc
  • First work in this direction

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 16

slide-17
SLIDE 17

New Mechanism: briefly

  • Two parameters ε, m
  • Multiple rounds of Vickrey auctions
  • Only m highest bids of a round are revealed (to all bidders)

⋆ No bidder will drop out before the last round

  • Auctions ends when the second highest bid of a round does not

change

  • The highest bidder of the last round gets the price for the second high-

est bid

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 17

slide-18
SLIDE 18

New Mechanism: briefly

  • Every bidder must prove that his bid is within the fraction of 1 − ε from

his bid of the first round

  • Cognitive costs vs effectiveness:

⋆ If ε is large, the bidders must do more homework, but auction con- verges quicker

  • Cognitive costs vs privacy:

⋆ If m is small, privacy properties are better but bidders have less information about their own valuations

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 18

slide-19
SLIDE 19

Cryptographic Subtleties

  • Can use whatever cryptographic protocols that make it possible for

the bidders/auctioneer to efficiently prove in zero-knowledge that they behave correctly

  • Example setting:

⋆ Use ideas from Lipmaa-Asokan-Niemi (FC 2002) ⋆ Homomomomomorphic auction scheme ⋆ Provides efficient zero-knowledge arguments

  • Details omitted from the talk (see the paper)

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 19

slide-20
SLIDE 20

Conclusions

  • First attempt to combine two completely different research communi-

ties from scratch

  • Constructing a cryptographic mechanism enables to achieve many

nice properties not achieved by layered approach

  • Concrete cryptographic implementation is very efficient

FC 2004, 03.12.2003 Interleaving Cryptography and Mechanism Design, Elkind/Lipmaa 20