How to Make Rational Arguments Practical and Extractable

M Campanelli, C Ganesh, R Gennaro - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We investigate proof systems where security holds against rational parties instead of
malicious ones. Our starting point is the notion of rational arguments, a variant of rational …

Sequentially composable rational proofs

M Campanelli, R Gennaro - Decision and Game Theory for Security: 6th …, 2015 - Springer
Abstract We show that Rational Proofs do not satisfy basic compositional properties in the
case where a large number of “computation problems” are outsourced. We show that a “fast” …

Efficient rational proofs for space bounded computations

M Campanelli, R Gennaro - Decision and Game Theory for Security: 8th …, 2017 - Springer
We present new protocols for the verification of space bounded polytime computations
against a rational adversary. For such computations requiring sublinear space our protocol …

Super-efficient rational proofs

PD Azar, S Micali - Proceedings of the fourteenth ACM conference on …, 2013 - dl.acm.org
Information asymmetry is a central problem in both computer science and economics. In
many fundamental problems, an uninformed principal wants to obtain some knowledge from …

Rational arguments: single round delegation with sublinear verification

S Guo, P Hubáček, A Rosen, M Vald - Proceedings of the 5th …, 2014 - dl.acm.org
Rational proofs, recently introduced by Azar and Micali (STOC 2012), are a variant of
interactive proofs in which the prover is neither honest nor malicious, but rather rational. The …

Rational proofs against rational verifiers

K Inasawa, K Yasunaga - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Rational proofs, introduced by Azar and Micali (STOC 2012), are a variant of interactive
proofs in which the prover is rational, and may deviate from the protocol for increasing his …

Rational proofs with multiple provers

J Chen, S McCauley, S Singh - … of the 2016 ACM Conference on …, 2016 - dl.acm.org
Interactive proofs model a world where a verifier delegates computation to an untrustworthy
prover, verifying the prover's claims before accepting them. These proofs have applications …

Improved efficient arguments: Preliminary version

J Kilian - Advances in Cryptology—CRYPT0'95: 15th Annual …, 1995 - Springer
We consider complexity of perfect zero-knowledge arguments [4]. Let T denote the time
needed to (deterministically) check a proof and let L denote an appropriate security …

On succinct arguments and witness encryption from groups

O Barta, Y Ishai, R Ostrovsky, DJ Wu - Annual International Cryptology …, 2020 - Springer
Succinct non-interactive arguments (SNARGs) enable proofs of NP statements with very low
communication. Recently, there has been significant work in both theory and practice on …

Explainable arguments

L Hanzlik, K Kluczniak - … Conference on Financial Cryptography and Data …, 2022 - Springer
We introduce an intriguing new type of argument systems with the additional property of
being explainable. Intuitively by explainable, we mean that given any argument under a …