Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model
Abstract
1. Introduction
- Based on Bayesian games, the Buttyan model is extended by incorporating participant types and beliefs, enhancing the expression of uncertainties.
- Introduce attack messages to simulate the potential fraudulent behaviors that participants may exploit through security vulnerabilities in the protocol.
- Taking the rational electronic contract signing protocol as an example, the improved model is used to formally analyze it, resulting in a set of clear judgment conditions to assess whether users follow the protocol agreement for transactions.
2. Related Work
2.1. Rational Exchange Protocol Model
2.2. Application of Game Theory in Network Security
3. Fundamentals
3.1. Game Theory
- 1.
- Utility Function
- 2.
- Nash Equilibrium
3.2. The Buttyan Model
- is the set of participants, including all individuals involved in the protocol. It can be expressed as , where and represent the two parties involved in the protocol, and represents the network used by participants for communication, which is assumed to be fully reliable in this model.
- is the set of actions for participants, including all possible actions that participants can take at each stage of the game. Protocol participants face three basic strategic choices: first, to follow the protocol and send honest messages ; second, to engage in deceptive behavior by sending false messages ; and third, to withdraw from the protocol .
- is the set of action sequences. For any action , indicates the action following the non-terminal action sequence , and represents the set of optional actions for participant following the non-terminal action sequence . If is a terminal action sequence, it indicating the end of the protocol execution. The empty sequence is also a subset of the action sequence set, representing the starting point of the game. The Buttyan model does not allow protocol parties to run multiple protocol instances simultaneously; that is, it does not consider interleaving attacks.
- is the information set for participant . For any two non-terminal action sequences and , if and , then and belong to the same information set of participant .
- is the participant function used to determine which participant should take the next action following a non-terminal action sequence. It can be expressed as: , where is the terminal action sequence. For any non-terminal action sequence , indicates which participant will take the next action following sequence .
- is the preference relation for participant . It indicates the preference ranking of each participant for different outcomes, describing the rational behavior of participants in the protocol, that is, the tendency to choose actions that can maximize their own interests.
4. The Extension of the Buttyan Model
4.1. The Shortcomings of the Buttyan Model
- 1.
- Lack of ability to handle uncertainties.
- 2.
- There are certain limitations in describing the malicious behaviors of participants, and the handling of false messages is not sufficient.
4.2. The Improved Buttyan Model
4.2.1. Bayesian Game
4.2.2. Analysis Method
5. Formal Analysis of the Protocol
5.1. Description of the Rational Electronic Contract Signing Protocol
- Step 1 (): Participant sends and to , signs these pieces of information with , and then sends the entire message to .
- Step 2 (): Participant sends to . Since contains a copy of , can confirm that has received message .
- Step 3 (): Participant sends to . receives and uses it to decrypt the signature of the contract , thereby obtaining .
5.2. Participant Types and Action Sets
5.3. Beliefs and Strategies
5.4. Action Sequences and Information Sets
5.5. Utility Functions and Expected Payoffs
6. Discussion
- Handling uncertainty: The original Buttyan model assumes complete information and reliable networks, which is not realistic in real-life scenarios. Our model solves the problems of uncertainty and information asymmetry by introducing Bayesian games and increasing participant types and beliefs.
- Handling attack messages: None of the existing models adequately handle attack messages or potential fraud. Our model introduces attack messages to simulate and analyze potential vulnerabilities, enhancing the robustness of the protocol.
- Result and process fairness: While the original Buttyan and Alcaide models focus on outcome fairness, they ignore fairness in the protocol process. Our model ensures fairness of the results and processes by introducing Bayesian game and attack messages.
- Fraud prevention capability: The original model lacks processing of false messages. Our model enhances fraud prevention capabilities by introducing attack messages and penalties for sending false information.
7. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
- Define the types of sellers and buyers: Sellers can be divided into cooperative types and non-cooperative types. In the process of electronic payment, since buyers only pay for goods, there is no equal description of buyers. There is only one cooperative type, and they remain honest;
- Define beliefs: In electronic contracts, naturally assigns types to sellers with a certain probability and represents the messages sent with a certain probability;
- Introduce attack messages: During the transaction, the seller may send an attack message (such as forged product information) to the buyer to mislead the buyer. Attack messages include false messages that the buyer can identify and false messages that the buyer cannot identify. For false messages identified by buyers, based on maximizing the interests of buyers, buyers should choose to exit the agreement in the second round; for false messages that cannot be identified, buyers continue to trade, and in the third round, based on maximizing the interests of sellers, sellers should choose to exit the agreement;
- Calculate expected benefits: According to probability and net benefits, the expected benefits of sellers and buyers can be calculated, respectively. By comparing expected benefits, the judgment conditions for reaching two sets of agreements can be obtained. These conditions ensure that participants have an incentive to follow the protocol given their beliefs and strategies.
- Through a series of steps, the improved Buttyan model is able to more accurately simulate uncertainty in reality, thus providing a more comprehensive perspective for the security analysis of electronic payment protocols.
References
- Shen, Y.; Shepherd, C.; Ahmed, C.M.; Shen, S.; Wu, X.; Ke, W.; Yu, S. Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 2024, 133, 108449. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhang, C.; Pang, J.; Mauw, S. Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 2012, 8, 111–124. [Google Scholar] [CrossRef]
- Xu, G.; Zhang, Y.; Sangaiah, A.K.; Li, X.; Castiglione, A.; Zheng, X. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 2019, 476, 505–515. [Google Scholar] [CrossRef]
- Maitra, A.; De, S.J.; Paul, G.; Pal, A.K. Proposal for quantum rational secret sharing. Phys. Rev. A 2015, 92, 022305. [Google Scholar] [CrossRef]
- Harn, L.; Lin, C.; Li, Y. Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 2015, 23, 1–7. [Google Scholar] [CrossRef]
- Abate, A.; Gutierrez, J.; Hammond, L.; Harrenstein, P.; Kwiatkowska, M.; Najib, M.; Perelli, G.; Steeples, T.; Wooldridge, M. Rational verification: Game-theoretic verification of multi-agent systems. Appl. Intell. 2021, 51, 6569–6584. [Google Scholar] [CrossRef]
- Zhao, B.; Liu, X.; Song, A.; Chen, W.-N.; Lai, K.-K.; Zhang, J.; Deng, R.H. Primpso: A privacy-preserving multiagent particle swarm optimization algorithm. IEEE Trans. Cybern. 2022, 53, 7136–7149. [Google Scholar] [CrossRef]
- Syverson, P. Weakly secret bit commitment: Applications to lotteries and fair exchange. In Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, MA, USA, 9–11 June 1998; pp. 2–13. [Google Scholar]
- Buttyán, L.; Hubaux, J.-P.; Čapkun, S. A formal model of rational exchange and its application to the analysis of Syverson’s protocol. J. Comput. Secur. 2004, 12, 551–587. [Google Scholar] [CrossRef]
- Alcaide, A.; Estevez-Tapiador, J.M.; Hernandez-Castro, J.C.; Ribagorda, A. A multi-party rational exchange protocol. In Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, Vilamoura, Portugal, 25–30 November 2007; pp. 42–43. [Google Scholar]
- Estevez-Tapiador, J.M.; Alcaide, A.; Hernandez-Castro, J.C.; Ribagorda, A. Bayesian rational exchange. Int. J. Inf. Secur. 2008, 7, 85–100. [Google Scholar] [CrossRef]
- Mittelmann, M.; Maubert, B.; Murano, A.; Perrussel, L. Formal verification of bayesian mechanisms. In Proceedings of the 37th AAAI Conference on Artificial Intelligence, Washington, DC, USA, 7–14 February 2023; pp. 11621–11629. [Google Scholar]
- Liu, L.; Zhang, L.; Liao, S.; Liu, J.; Wang, Z. A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense. Inf. Sci. 2021, 577, 245–264. [Google Scholar] [CrossRef]
- Cai, L.; Dai, Y.; Hu, Q.; Zhou, J.; Zhang, Y.; Jiang, T. Bayesian Game-Driven Incentive Mechanism for Blockchain-Enabled Secure Federated Learning in 6 G Wireless Networks. IEEE Trans. Netw. Sci. Eng. 2024, 11, 4951–4964. [Google Scholar] [CrossRef]
- Dahiya, A.; Gupta, B.B. A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Future Gener. Comp. Syst. 2021, 117, 193–204. [Google Scholar] [CrossRef]
- Kumari, P.; Gupta, H.P.; Dutta, T. A Bayesian game based approach for associating the nodes to the gateway in LoRa network. IEEE Trans. Intell. Transp. Syst. 2021, 23, 4583–4592. [Google Scholar] [CrossRef]
- Chen, X.; Feng, W.; Luo, Y.; Shen, M.; Ge, N.; Wang, X. Defending against link flooding attacks in internet of things: A bayesian game approach. IEEE Internet Things J. 2021, 9, 117–128. [Google Scholar] [CrossRef]
- Ding, H.; Peng, C.; Kuang, Q. A Rational Exchange Protocol Model under Mixed Strategies. J. Netw. Inf. Secur. 2016, 2, 68–75. (In Chinese) [Google Scholar]
- Tao, X.; Li, G.; Sun, D.; Cai, H. A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds. Future Gener. Comp. Syst. 2017, 76, 582–589. [Google Scholar] [CrossRef]
- Lohr, M.; Skiba, K.; Konersmann, M.; Jürjens, J.; Staab, S. Formalizing cost fairness for two-party exchange protocols using game theory and applications to blockchain. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2–5 May 2022; pp. 1–5. [Google Scholar]
- Cai, L.; Luo, L.; Li, Z.; Xiong, Z. A game-based dynamic clustering routing strategy for mobile wireless sensor networks. IEEE Internet Things J. 2024, 11, 26481–26491. [Google Scholar] [CrossRef]
- Lv, Z.; Peng, C.; Peng, Y.; Zhang, J.; Computing, M. A rational exchange protocol under asymmetric information in wireless sensor networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9437936. [Google Scholar] [CrossRef]
- Luo, J.R.; Zhang, W.P.; Su, J.M.; Yuan, W.L.; Chen, J. Research Progress on Multi-Agent Game Learning. Syst. Eng. Electron. 2024, 46, 1628–1655. (In Chinese) [Google Scholar]
- Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.-C.; Kim, D.I. A survey on applications of game theory in blockchain. arXiv 2019. [Google Scholar] [CrossRef]
- Chen, Z.; Tian, Y.; Peng, C. An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci. China Inf. Sci. 2021, 64, 202301. [Google Scholar] [CrossRef]
- Yan, X.; Huang, C.; Gan, J.; Wu, X. Game theory-based energy-efficient clustering algorithm for wireless sensor networks. Sensors 2022, 22, 478. [Google Scholar] [CrossRef] [PubMed]
- Tian, Y.; Ma, J.; Peng, C.; Chen, X.; Ji, W. One-time rational secret sharing scheme based on bayesian game. Wuhan Univ. J. Nat. Sci. 2011, 16, 430–434. [Google Scholar] [CrossRef]
- Bonanno, G. Rational Play in Extensive-Form Games. Games 2022, 13, 72. [Google Scholar] [CrossRef]
- Fang, H.; Yi, P. Adaptive Decision-Making in Attack-Defense Games with Bayesian Inference of Rationality Level. IEEE Trans. Ind. Electron. 2024, 71, 16558–16567. [Google Scholar] [CrossRef]
- Wu, Y.; Feng, G.; Wang, N.; Liang, H. Game of information security investment: Impact of attack types and network vulnerability. Expert Syst. Appl. 2015, 42, 6132–6146. [Google Scholar] [CrossRef]
- Kremer, S.; Raskin, J.-F. Game analysis of abuse-free contract signing. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, 24–26 June 2002; pp. 206–220. [Google Scholar]
- Heng, S.-H.; Tan, S.-Y. A survey on optimistic fair exchange protocol and its variants. In Proceedings of the 2017 5th International Conference on Information and Communication Technology, Melaka, Malaysia, 17–19 May 2017; pp. 1–6. [Google Scholar]
- Ouyang, Y.; Tavafoghi, H.; Teneketzis, D. Dynamic games with asymmetric information: Common information based perfect bayesian equilibria and sequential decomposition. IEEE Trans. Autom. Control 2016, 62, 222–237. [Google Scholar] [CrossRef]
Notations | The Meaning of Notations |
---|---|
message false message | |
attack message | |
items | |
encryption algorithm | |
description of item A | |
key | |
secret commitment function | |
Nature | |
protocol participant | |
belief set | |
probability distribution | |
Participant ’s penalty value | |
penalty value | |
utility function | |
The payoffs for participants and | |
The costs for participants and | |
probability function | |
belief function | |
strategy set of participant | |
strategy profile | |
type space of participant | |
type of participant |
Abbreviations/Notations | The Meaning of Abbreviations/Notations |
---|---|
private keys of and | |
contract signature description | |
contract signatures of and | |
random number | |
cooperative type , non-cooperative type | |
cooperative type | |
the type spaces of and | |
the action sets of and | |
probability of the cooperative type | |
probability of the non-cooperative type | |
the probability of participant sending | |
expected payoff | |
probability function | |
strategy set of and | |
strategy profile | |
pure strategies of and | |
Information sets of and | |
and | |
or | |
send message | |
TTP | Trusted Third Party |
PSL | Probabilistic Strategy Logic |
PBNE | Perfect Bayesian Nash Equilibrium |
IoT | Internet of Things |
CMP | Contract Management Party |
Instance Number | ||||
---|---|---|---|---|
1 | 3 | 8 | 0.375 | |
2 | 4 | 8 | 0.5 | |
3 | 6 | 8 | 0.75 | |
4 | 6 | 10 | 0.6 | |
5 | 6 | 12 | 0.5 |
Comparison Dimensions | Original Buttyan Model | Alcaide Model | Ding Model | Tao Model | Our Model |
---|---|---|---|---|---|
Handling uncertainty | × | √ | × | × | √ |
Handling attack messages | × | × | × | × | √ |
Result fairness | √ | √ | √ | √ | √ |
Process fairness | × | × | √ | × | √ |
Fraud prevention capability | × | × | × | × | √ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xiao, M.; Chen, L.; Yang, K.; Li, Z. Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry 2025, 17, 1033. https://doi.org/10.3390/sym17071033
Xiao M, Chen L, Yang K, Li Z. Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry. 2025; 17(7):1033. https://doi.org/10.3390/sym17071033
Chicago/Turabian StyleXiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. 2025. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model" Symmetry 17, no. 7: 1033. https://doi.org/10.3390/sym17071033
APA StyleXiao, M., Chen, L., Yang, K., & Li, Z. (2025). Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry, 17(7), 1033. https://doi.org/10.3390/sym17071033