Tools for Game Theoretic Models of Security for Cryptocurrencies
Sarah Azouvi Protocol Labs, University College London
March, 8th 2020
Alexander Hicks University College London
CES’20 MIT
Tools for Game Theoretic Models of Security for Cryptocurrencies - - PowerPoint PPT Presentation
Tools for Game Theoretic Models of Security for Cryptocurrencies Sarah Azouvi Protocol Labs, University College London Alexander Hicks University College London CES20 MIT March, 8th 2020 Blockchains Block1 Block2 Block3 = Defends
Sarah Azouvi Protocol Labs, University College London
March, 8th 2020
Alexander Hicks University College London
CES’20 MIT
Block1 Block2 Block3
consider incentives
than technical constructions
Nash Equilibrium (NE)
Coalitions? Arbitrary Faults External Incentives Irrational Players Computing a NE is hard
Desired outcome Game Israeli Nursery Study
Things “work” No Trusted third party
Rational Players Byzantine (Malicious) Players Altruistic Players
Coalitions Rational Players Byzantine (Malicious) Players Altruistic Players Coalitions
Rational protocol design Protocol can have vulnerabilities
(especially short term profit vs long term profit)
sarah.azouvi@protocol.ai @SarahAzouvi