Home > Research > Publications & Outputs > Multi-rate Threshold FlipThem

Electronic data

  • 611

    Accepted author manuscript, 572 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Multi-rate Threshold FlipThem

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Multi-rate Threshold FlipThem. / Leslie, David Stuart; Sherfield, Chris L; Smart, Nigel P.
Computer Security – ESORICS 2017: Lecture Notes in Computer Science, vol 10493. ed. / S. Foley; D. Gollmann; E. Snekkenes. Springer, 2017. p. 174-190 (Lecture Notes in Computer Science; Vol. 10493).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Leslie, DS, Sherfield, CL & Smart, NP 2017, Multi-rate Threshold FlipThem. in S Foley, D Gollmann & E Snekkenes (eds), Computer Security – ESORICS 2017: Lecture Notes in Computer Science, vol 10493. Lecture Notes in Computer Science, vol. 10493, Springer, pp. 174-190. https://doi.org/10.1007/978-3-319-66399-9_10

APA

Leslie, D. S., Sherfield, C. L., & Smart, N. P. (2017). Multi-rate Threshold FlipThem. In S. Foley, D. Gollmann, & E. Snekkenes (Eds.), Computer Security – ESORICS 2017: Lecture Notes in Computer Science, vol 10493 (pp. 174-190). (Lecture Notes in Computer Science; Vol. 10493). Springer. https://doi.org/10.1007/978-3-319-66399-9_10

Vancouver

Leslie DS, Sherfield CL, Smart NP. Multi-rate Threshold FlipThem. In Foley S, Gollmann D, Snekkenes E, editors, Computer Security – ESORICS 2017: Lecture Notes in Computer Science, vol 10493. Springer. 2017. p. 174-190. (Lecture Notes in Computer Science). doi: 10.1007/978-3-319-66399-9_10

Author

Leslie, David Stuart ; Sherfield, Chris L ; Smart, Nigel P. / Multi-rate Threshold FlipThem. Computer Security – ESORICS 2017: Lecture Notes in Computer Science, vol 10493. editor / S. Foley ; D. Gollmann ; E. Snekkenes. Springer, 2017. pp. 174-190 (Lecture Notes in Computer Science).

Bibtex

@inproceedings{6890996dc03d42d486f69d7e9ff853de,
title = "Multi-rate Threshold FlipThem",
abstract = "A standard method to protect data and secrets is to apply threshold cryptography in the form of secret sharing. This is motivated by the acceptance that adversaries will compromise systems at some point; and hence using threshold cryptography provides a defence in depth. The existence of such powerful adversaries has also motivated the introduction of game theoretic techniques into the analysis of systems, e.g. via the FlipIt game of van Dijk et al. This work further analyses the case of FlipIt when used with multiple resources, dubbed FlipThem in prior papers. We examine two key extensions of the FlipThem game to more realistic scenarios; namely separate costs and strategies on each resource, and a learning approach obtained using so-called fictitious play in which players do not know about opponent costs, or assume rationality.",
author = "Leslie, {David Stuart} and Sherfield, {Chris L} and Smart, {Nigel P.}",
year = "2017",
month = aug,
day = "12",
doi = "10.1007/978-3-319-66399-9_10",
language = "English",
isbn = "9783319663982",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "174--190",
editor = "S. Foley and D. Gollmann and E. Snekkenes",
booktitle = "Computer Security – ESORICS 2017",

}

RIS

TY - GEN

T1 - Multi-rate Threshold FlipThem

AU - Leslie, David Stuart

AU - Sherfield, Chris L

AU - Smart, Nigel P.

PY - 2017/8/12

Y1 - 2017/8/12

N2 - A standard method to protect data and secrets is to apply threshold cryptography in the form of secret sharing. This is motivated by the acceptance that adversaries will compromise systems at some point; and hence using threshold cryptography provides a defence in depth. The existence of such powerful adversaries has also motivated the introduction of game theoretic techniques into the analysis of systems, e.g. via the FlipIt game of van Dijk et al. This work further analyses the case of FlipIt when used with multiple resources, dubbed FlipThem in prior papers. We examine two key extensions of the FlipThem game to more realistic scenarios; namely separate costs and strategies on each resource, and a learning approach obtained using so-called fictitious play in which players do not know about opponent costs, or assume rationality.

AB - A standard method to protect data and secrets is to apply threshold cryptography in the form of secret sharing. This is motivated by the acceptance that adversaries will compromise systems at some point; and hence using threshold cryptography provides a defence in depth. The existence of such powerful adversaries has also motivated the introduction of game theoretic techniques into the analysis of systems, e.g. via the FlipIt game of van Dijk et al. This work further analyses the case of FlipIt when used with multiple resources, dubbed FlipThem in prior papers. We examine two key extensions of the FlipThem game to more realistic scenarios; namely separate costs and strategies on each resource, and a learning approach obtained using so-called fictitious play in which players do not know about opponent costs, or assume rationality.

U2 - 10.1007/978-3-319-66399-9_10

DO - 10.1007/978-3-319-66399-9_10

M3 - Conference contribution/Paper

SN - 9783319663982

T3 - Lecture Notes in Computer Science

SP - 174

EP - 190

BT - Computer Security – ESORICS 2017

A2 - Foley, S.

A2 - Gollmann, D.

A2 - Snekkenes, E.

PB - Springer

ER -