Tools for Game Theoretic Models of Security for Cryptocurrencies - - PowerPoint PPT Presentation

tools for game theoretic models of security for
SMART_READER_LITE
LIVE PREVIEW

Tools for Game Theoretic Models of Security for Cryptocurrencies - - PowerPoint PPT Presentation

Tools for Game Theoretic Models of Security for Cryptocurrencies Sarah Azouvi Protocol Labs, University College London Alexander Hicks University College London CES20 MIT March, 8th 2020 Blockchains Block1 Block2 Block3 = Defends


slide-1
SLIDE 1

Tools for Game Theoretic Models of Security for Cryptocurrencies

Sarah Azouvi Protocol Labs, University College London

March, 8th 2020

Alexander Hicks University College London

CES’20 MIT

slide-2
SLIDE 2

Blockchains

=

Block1 Block2 Block3

  • Defends against Sybil attacks
  • Incentivizes consensus
  • Decentralised
  • More participation More secure
slide-3
SLIDE 3

Blockchains’ Security

  • Traditional Distributed Systems and Cryptography do not

consider incentives

  • Game Theory does not consider security notions
  • How to capture blockchains’ security?
  • Mix Game Theory and Security?
slide-4
SLIDE 4
  • Has been studied a lot before Bitcoin
  • We reviewed a lot of papers
  • Non-exhaustive

Game Theory (GT) and Security?

slide-5
SLIDE 5

Why mix GT and security?

  • Security Economics tells us that security is about more

than technical constructions

  • “Incentives in Security Protocols” (SPW 2018)
  • GT/Mechanism Design (MD) serves to promote good
  • utcomes
slide-6
SLIDE 6

GT/MD primer

Nash Equilibrium (NE)

slide-7
SLIDE 7

NE Limitations

Coalitions? Arbitrary Faults External Incentives Irrational Players Computing a NE is hard

slide-8
SLIDE 8

Mechanism Design

Desired outcome Game Israeli Nursery Study

slide-9
SLIDE 9

Security

Things “work” No Trusted third party

slide-10
SLIDE 10
  • Mixing different framework:
  • Addition skills required
  • Increased Complexity
  • Different assumptions

Why is combining security and GT is hard?

slide-11
SLIDE 11

Consensus

slide-12
SLIDE 12

BAR Model

Rational Players Byzantine (Malicious) Players Altruistic Players

slide-13
SLIDE 13

Coalitions Rational Players Byzantine (Malicious) Players Altruistic Players Coalitions

Robustness

slide-14
SLIDE 14

Cryptography

slide-15
SLIDE 15

Rational Cryptography

Rational protocol design Protocol can have vulnerabilities

𝛒 𝘉

slide-16
SLIDE 16

Blockchains

  • Consensus
  • No model widely adapted
  • Decentralisation
  • Empirical work
slide-17
SLIDE 17

Open problems

  • Utilities hard to compute in practice
  • Most of the research is theoretical
  • Empirical data on behaviour of players and coalitions

(especially short term profit vs long term profit)

slide-18
SLIDE 18

Questions?

sarah.azouvi@protocol.ai @SarahAzouvi