TY - CHAP
T1 - Cryptographic Games
AU - Rass, Stefan
AU - Schauer, Stefan
AU - König, Sandra
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - The term “game” has substantially different meanings within the security area, depending on whether we speak about cryptographic security in particular, or system security in a more general setting that includes quantitative security with help of game theory. Game theory and cryptography are, however, of mutual value for each other, since game theory can help designing self-enforcing security of cryptographic protocols, and cryptography contributes invaluable mechanisms to implement games for security. This chapter introduces both ideas, being rational cryptography for the design of protocols that use rationality to incentivize players to follow faithfully, but also addresses the classical security goals like confidentiality, integrity, availability and authenticity by describing security games with quantitative and unconditional security guarantees. The chapter closes with a connection between network design for security and the P/NP question whose discovery is made with help from game theory.
AB - The term “game” has substantially different meanings within the security area, depending on whether we speak about cryptographic security in particular, or system security in a more general setting that includes quantitative security with help of game theory. Game theory and cryptography are, however, of mutual value for each other, since game theory can help designing self-enforcing security of cryptographic protocols, and cryptography contributes invaluable mechanisms to implement games for security. This chapter introduces both ideas, being rational cryptography for the design of protocols that use rationality to incentivize players to follow faithfully, but also addresses the classical security goals like confidentiality, integrity, availability and authenticity by describing security games with quantitative and unconditional security guarantees. The chapter closes with a connection between network design for security and the P/NP question whose discovery is made with help from game theory.
UR - http://www.scopus.com/inward/record.url?scp=85087555470&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85087555470&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-46908-5_11
DO - 10.1007/978-3-030-46908-5_11
M3 - Chapter
AN - SCOPUS:85087555470
T3 - Advanced Sciences and Technologies for Security Applications
SP - 223
EP - 247
BT - Advanced Sciences and Technologies for Security Applications
PB - Springer
ER -