Multi-rate threshold FlipThem

David Leslie, Chris Sherfield, Nigel Smart

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Abstract

A standard method to protect data and secrets is to apply threshold cryptography in the form of secret sharing. This is motivated by the acceptance that adversaries will compromise systems at some point; and hence using threshold cryptography provides a defence in depth. The existence of such powerful adversaries has also motivated the introduction of game theoretic techniques into the analysis of systems, e.g. via the FlipIt game of van Dijk et al. This work further analyses the case of FlipIt when used with multiple resources, dubbed FlipThem in prior papers. We examine two key extensions of the FlipThem game to more realistic scenarios; namely separate costs and strategies on each resource, and a learning approach obtained using so-called fictitious play in which players do not know about opponent costs, or assume rationality
Original languageEnglish
Title of host publicationEuropean Symposium on Research in Computer Security: ESORICS 2017
Subtitle of host publicationPart II
PublisherSpringer
Pages174-190
Number of pages17
Volume10493
ISBN (Print)9783319663999
DOIs
Publication statusPublished - 1 Sep 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
ISSN (Print)0302-9743

Fingerprint

Dive into the research topics of 'Multi-rate threshold FlipThem'. Together they form a unique fingerprint.
  • TIPS Fellowship

    Smart, N. P.

    1/10/1630/09/21

    Project: Research

Cite this