Next Article in Journal
A Three-Parameter Record-Based Transmuted Rayleigh Distribution (Order 3): Theory and Real-Data Applications
Previous Article in Journal
Symmetry-Guided Identification of Spatial Electricity Price Anomalies via Data Partitioning and Density Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model

School of Information and Software Engineering, East China Jiaotong University, Nanchang 330013, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(7), 1033; https://doi.org/10.3390/sym17071033
Submission received: 30 March 2025 / Revised: 6 May 2025 / Accepted: 7 May 2025 / Published: 1 July 2025
(This article belongs to the Section Computer)

Abstract

A rational exchange protocol is a type of e-commerce protocol that aims to maximize the participants’ own interests. The Buttyan model is commonly used to analyze the security of such protocols. However, this model has limitations in dealing with uncertainties and false messages in rational exchanges. To address these shortcomings, this paper proposes a formal analysis method based on Bayesian games. By incorporating participants’ types and beliefs, the Buttyan model is extended to enhance its ability to express uncertainties. Additionally, attack messages are introduced to simulate the potential fraudulent behaviors that participants may exploit through the security vulnerabilities in the protocol. Finally, the improved model is applied to conduct a formal analysis of a rational electronic contract signing protocol, and it is found that the protocol meets the usability requirements. The results show that this method can be effectively applied to the security analysis of rational exchange protocols, thereby enhancing the security of the e-commerce transaction process.

1. Introduction

Rational exchange protocols are a special type of cryptographic protocol [1]. In the absence of a trusted third party (TTP), they ensure secure and fair transactions among self-interested participants through game theory. These protocols are widely used in various fields such as electronic contracts [2,3], micropayment systems, secure communications, online voting, and auctions. They improve transaction efficiency and security while reducing dependence on trusted third parties. Currently, research on game theory-based cryptography mainly focuses on three areas: rational exchange protocols, rational secret sharing [4,5], and rational secure multi-party computation [6,7].
In [8], Syverson first proposed the concept of rational exchange and designed the Syverson protocol, a rational exchange protocol based on weak bit commitment functions. Buttyan [9] analyzed rational exchange protocols using a basic game-theoretic formal model, defining rational exchange and exploring its relationship with fair exchange. They also proved the rationality of the Syverson protocol under the assumption of a reliable network. Subsequently, Almudena Alcaide [10,11] proposed a rational exchange protocol model based on the Bayesian game theory, extending the Buttyan model and first proposing a rational fair exchange protocol for multiple parties. These studies mainly focused on the fairness of the exchange results, without covering the fairness during the protocol process.
Bayesian games are games of incomplete information. Munyque Mittelmann [12] first studied the formal verification of Bayesian mechanisms through strategy reasoning, using the probabilistic strategy logic (PSL) framework to transform the verification problem into a PSL model checking problem. Liu [13] proposed a generalized method to solve the Perfect Bayesian Nash Equilibrium (PBNE) in practical network attack and defense scenarios. Many researchers have designed a series of effective incentive schemes based on Bayesian games [14,15]. In addition, some scholars have applied Bayesian games to LoRa networks to defend against link flooding attacks [16,17].
The Buttyan model has built a game-theoretic mathematical framework for the analysis of rational exchange protocols. However, it has certain limitations in dealing with uncertainties and false messages in rational exchanges. These limitations may lead to inaccurate assessments of the protocol’s robustness, reliability, and adaptability and may even cause incorrect decisions and behavioral deviations during the protocol execution process. Therefore, this paper improves the Buttyan model based on its shortcomings. The main contributions are as follows:
  • Based on Bayesian games, the Buttyan model is extended by incorporating participant types and beliefs, enhancing the expression of uncertainties.
  • Introduce attack messages a m * to simulate the potential fraudulent behaviors that participants may exploit through security vulnerabilities in the protocol.
  • Taking the rational electronic contract signing protocol as an example, the improved model is used to formally analyze it, resulting in a set of clear judgment conditions to assess whether users follow the protocol agreement for transactions.
The rest of this paper is arranged as follows: Section 2 reviews the rational exchange protocol model and the application of game theory in network security. Section 3 introduces the basic knowledge of game theory and the Buttyan model. Section 4 proposes an improved Buttyan model. Based on the Bayesian game, the Buttyan model is extended and improved by incorporating participant types and beliefs and introducing attack messages a m * . Section 5 applies the improved model to formally analyze the rational electronic contract signing protocol. Section 6 compares it with other existing security models and discusses the limitations of the model. Section 7 summarizes the research results and elaborates on future research directions.

2. Related Work

This section introduces the application of the rational exchange protocol model and game theory in network security, which provides the theoretical basis and research background for the improved Buttyan model proposed in this paper.

2.1. Rational Exchange Protocol Model

The rational exchange protocol model is an important research direction in the field of e-commerce and network security. The early model proposed by Buttyan and Alcaide did not involve the fairness analysis of the protocol process. To this end, Ding et al. [18] proposed a rational exchange protocol model based on a mixed strategy, which used the mixed strategy theory of an extended game to simulate the exchange protocol and entropy theory to describe the fairness in the exchange process. However, it did not consider the situation where the network is unreliable and the process is not strictly fair. Tao et al. [19] proposed a model for analyzing the Internet of Things (IoT) protocol based on an incomplete information extended game, defined rationality and fairness properties, and verified these properties using tree analysis methods and linear time algorithms. Although the aforementioned studies provide an important theoretical basis for understanding the security and fairness of rational exchange protocols, none of them consider the risks posed by attack messages.

2.2. Application of Game Theory in Network Security

Game theory is widely used in network security, especially in blockchain [20], wireless sensor networks [21,22], and multi-agent systems [23]. Existing blockchain-related reviews do not discuss the application of game theory in depth. Some reviews only focus on blockchain security and privacy issues or the combination of blockchain with the Internet of Things and edge computing. In this regard, the literature [24] classified and reviewed the specific models and application scenarios of game theory in blockchain, filling the gap in the systematic analysis of the application of game theory in blockchain, mining management, and economic models. Chen [25] proposed an incentive-compatible rational secret sharing scheme based on blockchain and smart contracts. By redesigning the secret-sharing process, introducing incentive mechanisms, and adding verifiers, it solved the prisoner’s dilemma problem faced by rational participants in secret sharing. The application of game theory in wireless sensor networks has involved clustering and power control but has not combined state-switching thresholds and penalty mechanisms. Therefore, Yan [26] proposed an idle listening-sleep state switching model based on game theory and introduced a penalty mechanism to suppress node selfish behavior. Tian [27] proposed a one-time rational secret sharing scheme based on a Bayesian game, which solved the cooperation problem in one-time rational secret sharing and achieved perfect Bayesian equilibrium. Although this method has advantages in dealing with information asymmetry and participant uncertainty, it has high communication overhead. These studies show that game theory provides a powerful tool for the design and analysis of network security protocols.

3. Fundamentals

3.1. Game Theory

Game theory is a mathematical theory that studies the strategic interactions among decision-makers (participants or players) with characteristics of conflict and cooperation, where each participant attempts to maximize their own interests by selecting the optimal strategy. The main concepts related to game theory are as follows:
1.
Utility Function
The utility function is a measure of the payoff or degree of satisfaction for each participant given a combination of strategies, usually denoted by u i . For a given sequence of terminal actions q , the utility function of participant i can be expressed as
u i ( q ) = u i + ( q ) u i ( q )
where u i + ( q ) and u i ( q ) are the payoff and loss (cost) of participant i when executing the sequence of terminal actions q , respectively.
2.
Nash Equilibrium
In a game, if each participant’s strategy is optimal given the strategies of the other participants, this combination of strategies constitutes a Nash equilibrium. It can be formally represented as: for a game with n participants, if the strategy combination ( s 1 * , s 2 * , , s n * ) is a Nash equilibrium, then for the participant i , there is
u i ( s i * , s i * ) u i ( s i , s i * )
where u i is the utility function of participant i , s i * is the strategy combination of participant i in the equilibrium state, s i * is the strategy combination of the other participants in the equilibrium state, and S i is the strategy set of participant i .

3.2. The Buttyan Model

The Buttyan model [9] is a mathematical model based on game theory, proposed by Levente Buttyan et al., to analyze and define rational exchange protocols, especially for the analysis of the Syverson protocol. The model constructs an extensive-form game [28] through a series of elements to describe the interactions between protocol participants, which can be represented by a six-tuple G π = P , A , Q , ( I i ) i P , p , ( i ) i P to indicate a rational exchange protocol π , where
  • P is the set of participants, including all individuals involved in the protocol. It can be expressed as P = { P 1 , P 2 , n e t } , where P 1 and P 2 represent the two parties involved in the protocol, and n e t represents the network used by participants for communication, which is assumed to be fully reliable in this model.
  • A is the set of actions for participants, including all possible actions that participants can take at each stage of the game. Protocol participants face three basic strategic choices: first, to follow the protocol and send honest messages m ; second, to engage in deceptive behavior by sending false messages m * ; and third, to withdraw from the protocol q u i t .
  • Q is the set of action sequences. For any action a , q . a indicates the action a following the non-terminal action sequence q , and A i ( q ) represents the set of optional actions for participant i following the non-terminal action sequence q . If q . a is a terminal action sequence, it indicating the end of the protocol execution. The empty sequence is also a subset of the action sequence set, representing the starting point of the game. The Buttyan model does not allow protocol parties to run multiple protocol instances simultaneously; that is, it does not consider interleaving attacks.
  • ( I i ) i P is the information set for participant i . For any two non-terminal action sequences q 1 and q 2 , if p ( q 1 ) = p ( q 2 ) and A ( q 1 ) = A ( q 2 ) , then q 1 and q 2 belong to the same information set of participant i .
  • p is the participant function used to determine which participant should take the next action following a non-terminal action sequence. It can be expressed as: p : { Q \ Z } P , where Z is the terminal action sequence. For any non-terminal action sequence q , p ( q ) indicates which participant will take the next action following sequence q .
  • ( i ) i P is the preference relation for participant i . It indicates the preference ranking of each participant i P for different outcomes, describing the rational behavior of participants in the protocol, that is, the tendency to choose actions that can maximize their own interests.

4. The Extension of the Buttyan Model

4.1. The Shortcomings of the Buttyan Model

Although the Buttyan model has demonstrated certain capabilities in formally analyzing rational exchange protocols, a deeper investigation reveals that it is essentially a framework with many limitations. Its shortcomings are mainly reflected in the following two aspects:
1.
Lack of ability to handle uncertainties.
First, in the Buttyan model, action sequences are indistinguishable to participants and belong to the same information set. This means that the protocol participants have complete information about the structure of the game. However, in reality, information is often asymmetric. Participants may not fully understand the strategies or payoff functions of other participants. Therefore, using a complete information game is not realistic in actual operation. Second, the model assumes that the network is reliable, meaning that all messages can be accurately delivered within the scheduled time. However, in practical applications, the network may be unreliable. Messages may be delayed, lost, or tampered with. Therefore, when conducting security analysis, the trust level in other participants and the reliability of the network are two key factors that must be considered comprehensively to ensure the comprehensiveness and accuracy of the analysis.
2.
There are certain limitations in describing the malicious behaviors of participants, and the handling of false messages is not sufficient.
Figure 1 shows the interaction process of the Syverson protocol, where A and B represent the sender and receiver of the protocol, respectively. In this protocol, the items exchanged by the two parties are marked as i t e m A and i t e m B , where d e s c i t e m A is a description of i t e m A , e n c ( ) is an encryption algorithm that encrypts the message with key k , and w ( ) is a temporary secret commitment function used to keep the message confidential for a certain period of time (see reference [11] for details).
Figure 2 shows the game tree description of the Syverson protocol by the Buttyan model. The nodes represent the participants of the protocol, and the lines between the nodes represent the actions taken (sending messages or exiting the protocol). Participants will have corresponding benefits at each leaf node (see reference [11] for details). In the first round of interaction of the Buttyan model analysis protocol, participant A can not only transmit true information m 1 to participant B but also send false message m 1 * . Once A sends a false message to B , A will always be punished by F A . This means that the Buttyan model presupposes that participants can identify all false messages. It only focuses on those false messages that participants can detect, without fully considering those that are not identified. In the actual operation of the protocol, participants’ detection capabilities may be limited by technology. At the same time, attackers continuously develop new attack methods and tools. These new methods and tools may not be widely recognized for a period of time, making it difficult for participants to update their detection mechanisms in time to identify these new types of false messages. Therefore, in reality, it is not possible to expect all false messages to be identified by participants B . This limitation means that the Buttyan model needs further development and improvement.
The following are the main notational representations of the Buttyan model and the improved Buttyan model, as shown in Table 1.

4.2. The Improved Buttyan Model

4.2.1. Bayesian Game

To address the aforementioned shortcomings, a formal analysis method based on Bayesian games is proposed, which can more accurately simulate uncertainty and information asymmetry in the real world. The Buttyan model can be extended to an octuple: P , A , Q , ( I i ) i P , p , ( i ) i P , t , ρ .
Definition 1.
Participant types and type spaces: If participant  i  has a type  t i T i  , then  t = ( t 1 , t 2 , t n )  is the type of combination of participants, and  T = T 1 * T 2 * * T n  is the type combination space of participants, where  T i  is the type space of participant i  . Each participant may have multiple types, which determine their utility functions.
Definition 2.
Beliefs: Participants’ beliefs are represented in the form of probability distributions, which can be expressed using Greek letters such as  α  ,  μ  ,  β  , etc. Participant  i ’s belief about the types of other participants  j  is expressed through a probability distribution over the type space  Θ ( T j )  of  j  , and the set of all beliefs can be denoted by the letter  ρ .
The Bayesian game proposed in this paper is based on the framework of Bayesian rationality [11,29], which is used to reason and analyze rational exchange protocols. By introducing the concepts of participant types and beliefs, it can simultaneously incorporate the complete information game adopted by the Buttyan model and the unreliable network factors, thereby constructing a more complex and realistic model. Under this framework, participants do not fully understand the types of other participants. This uncertainty enhances the realism of the model. The types of participants are key factors in determining the payoffs participants receive in the protocol. Different types of participants may achieve different payoff outcomes under the same strategy choices, reflecting the impact of individual differences and information asymmetry in the real world on the decision-making process.
Moreover, “Nature” N , as an abstract entity, is responsible for assigning a type to each participant. This process is randomly conducted based on the probability distribution over each participant’s type space, enabling the Bayesian game to more realistically reflect participants’ decision-making under uncertainty. Compared with the basic game-theoretic framework in the Buttyan model, the Bayesian game provides a richer and more realistic analytical tool.
To highlight the improvements of the model, we introduce the types and beliefs of the participants based on Figure 1, as shown in Figure 3. Nature N randomly assigns types to participant A , where   φ ( t A 1 ) , φ ( t A 2 ) , …, φ ( t A n ) represents the probability of assigning each type (Equation (3)), A ( t A 1 ) , A ( t A 2 ) , …, A ( t A n ) indicates that participant A has n types, and α , μ , β represent the probabilities of sending messages m 1 , m 2 and m 3 . During the protocol analysis, the network can be regarded as a participant of a specific type, and its behavior (such as the reliability of message transmission) can be uncertain. In the game tree, the leaf nodes symbolize the end of the protocol, while the other nodes (except for leaf nodes and Nature N ) represent the decision points of the participants in the game process. The dashed lines indicate that participant B does not know the actions or strategy choices of participant A , reflecting the uncertainty of the game.
The probability distribution over T A is represented by φ , which can be expressed as
φ ( t A 1 ) = p r ( A t A 1 B ) φ ( t A 2 ) = p r ( A t A 2 B ) φ ( t A n ) = p r ( A t A n B ) s . t .   φ ( t A 1 ) + φ ( t A 2 ) + + φ ( t A n ) = 1
During the interaction of the protocol, participant A may exploit the potential unknown vulnerabilities [30] in the protocol to send fraudulent messages to B . Therefore:
Definition 3.
Attack message  a m *  : During the transaction, a participant may send an attack message (such as a forged message) to another participant. Attack messages include false messages that the participant can identify and false messages that the participant cannot identify.
When A sends an attack message a m * to B , for the recognizable false messages, B can choose to exit the protocol q u i t B . However, to ensure that A does not commit fraud against B again in the future, a certain punishment F ( F > u A + ) will be given to A . For the false messages that are not recognized by participant B , since the content and specific form of the false messages are unknown to B , B may choose to continue the transaction s e n d ( m 2 ) or exit the protocol q u i t B . In rational exchange protocols, A and B are rational participants who maximize their own interests. Therefore, in the third round of the interaction, A will not send m 3 or m 3 * to B , but will directly exit the protocol q u i t A . The introduction of the attack message a m * not only enhances the model’s adaptability to reality but also provides a more comprehensive perspective for analyzing participants’ behavior when facing potential fraud, more accurately reflecting the content of the messages. The interaction diagram with the introduction of the attack message a m * is shown in Figure 4.

4.2.2. Analysis Method

Based on the Buttyan model, this paper proposes two key improvements. The following is the flowchart of the improved Buttyan model for rational exchange protocol analysis, as shown in Figure 5. Appendix A shows a brief analysis process of the payment protocol based on the improved Buttyan model.
The flowchart describes the process of protocol analysis: starting from the “Start” node, first define the participant type and belief, then determine the sequence of actions and information sets, then build the utility function and calculate the expected return, and then check whether participants A and B meet the conditions for complying with the protocol. If they do, the agreement is reached and the process ends; if not, it is necessary to adjust or re-evaluate the participant type and belief and then return to redetermine the sequence of actions and information sets until the conditions are met.

5. Formal Analysis of the Protocol

5.1. Description of the Rational Electronic Contract Signing Protocol

To further illustrate the improved Buttyan model, this paper takes the rational electronic contract signing protocol as an example [31] and provides a detailed analysis. It is assumed that user A and user B each have a private key K A 1 and K B 1 , and both are rational participants who do not rely on the involvement of the Contract Management Party (CMP). The specific content of the protocol is shown in Figure 6. Item d e s c S i g A ( E c o n t r a c t ) is the description related to the contract signature S i g A ( E c o n t r a c t ) . User A encrypts S i g A ( E c o n t r a c t ) with a random number k to obtain e n c ( k , S i g A ( E c o n t r a c t ) ) . Items σ 1 , σ 2 , and σ 3 represent the operation of the sender signing the message with their own private key. Essentially, this protocol is a rational exchange protocol aimed at achieving the exchange between S i g A ( E c o n t r a c t ) and S i g B ( E c o n t r a c t ) . It should be noted that during the signature transaction, A may send an attack message (forged signature information) to B .
Table 2 shows the abbreviations and the meanings of some of the main notations in this chapter.
  • Step 1 ( m 1 ): Participant A sends d e s c S i g A ( E c o n t r a c t ) and e n c ( k , S i g A ( E c o n t r a c t ) ) to B , signs these pieces of information with K A 1 , and then sends the entire message m 1 to B .
  • Step 2 ( m 2 ): Participant B sends S i g B ( E c o n t r a c t ) to A . Since m 2 contains a copy of m 1 , A can confirm that B has received message m 1 .
  • Step 3 ( m 3 ): Participant A sends k to B . B receives k and uses it to decrypt the signature of the contract A , thereby obtaining S i g A ( E c o n t r a c t ) .
After the three-step electronic contract signing protocol is executed, both parties can obtain the contract signature from the other party, and the transaction is completed. As shown in Figure 5, participant B takes on more unknown risks in the transaction process compared to A . This is because B first lose control of their digital signature, so B should carefully evaluate factors such as the type and reputation of A .

5.2. Participant Types and Action Sets

To facilitate the analysis of the protocol, this paper only considers the types of A and B . The participant A can be divided into two categories: cooperative type A c and non-cooperative type A n c . Participant B has only one cooperative type, denoted as B c . It should be noted that the cooperative type may send false messages, and the non-cooperative type may also send true messages. Since sending message m 2 from B to A is agreed upon in advance by both parties of the protocol, and A can also verify the correctness of m 2 , B is always honest. The participant set of this protocol is P = { A , B } , and the type combination space can be represented as T = T A * T B . T A = { A c , A n c } and T B = { B c } represent the type spaces of participants A and B , respectively.
The action set of participants is composed of the action set A A of participant A and the action set A B of participant B , which can be represented as
  A = { A A , A B } A A = { s e n d ( m 1 ) , s e n d ( a m 1 * ) , s e n d ( m 3 ) , q u i t A } A B = { s e n d ( m 2 ) , q u i t B }
Among them, s e n d ( m i ) represents the sending message m i , q u i t A and q u i t B represent the protocol exit operations executed by participants A and B , respectively, and a m 1 * indicates that the first message in the protocol is an attack message.

5.3. Beliefs and Strategies

Suppose φ is a probability distribution over T A , which can be represented as
φ c = p r ( A c   |   B ) φ n c = p r ( A n c   |   B ) s . t .   φ c + φ n c = 1
Since T B has only one element, we have p r ( B   |   A c ) = p r ( B   |   A n c ) = 1 .
The belief of A is represented by a probability distribution over T B :
μ = p r ( s e n d ( m 2 ) )         1 μ = p r ( q u i t B )
The belief of B is represented by a probability distribution over T A :
α c = p r ( s e n d ( m 1 ) )         1 α c = p r ( s e n d ( a m 1 * ) ) α n c = p r ( s e n d ( m 1 ) )         1 α n c = p r ( s e n d ( a m 1 * ) ) a n d β c = p r ( s e n d ( m 3 )   |   s e n d ( m 1 ) )         1 β c = p r ( q u i t A   |   s e n d ( m 1 ) ) β n c = p r ( s e n d ( m 3 )   |   s e n d ( m 1 ) )         1 β n c = p r ( q u i t A   |   s e n d ( m 1 ) )  
In addition, based on maximizing its own interests, participant B should also have the following belief:
p r [ q u i t A   |   s e n d ( a m 1 * ) A c ] = 1 p r [ m 3   |   s e n d ( a m 1 * ) A c ] = 0 p r [ q u i t A   |   s e n d ( a m 1 * ) A n c ] = 1 p r [ m 3   |   s e n d ( a m 1 * ) A n c ] = 0
In game theory, a strategy refers to the course of action that a participant takes during the game. The strategy profile s can be represented as: s = ( s A , s B ) .
The pure strategy s A of participant A can be represented by a tuple:
s A S A = { ( s 1 , s 3 ) c , ( s 1 , s 3 ) n c } s 1 { s e n d ( m 1 ) , s e n d ( a m 1 * ) , q u i t A } s 3 { s e n d ( m 3 ) , q u i t A }
where the elements in s 1 and s 3 represent the optional actions of participant A in the first and third steps of the protocol, respectively, and the elements in S A represent the pure strategies of participant A for the cooperative and non-cooperative types, respectively. When expanded, it can be obtained as
s A S A = { ( s e n d ( m 1 ) , s e n d ( m 3 ) ) c , ( s e n d ( m 1 ) , q u i t A ) c , ( s e n d ( a m 1 * ) , q u i t A ) c , ( q u i t A , ) c , ( s e n d ( m 1 ) , s e n d ( m 3 ) ) n c , ( s e n d ( m 1 ) , q u i t A ) n c , ( s e n d ( a m 1 * ) , q u i t A ) n c , ( q u i t A , ) n c }
The pure strategy s B of participant B can be represented as
s B S B = { s e n d ( m 2 ) , q u i t B }
where the elements in S B represent the optional actions of participant B in the second step of the protocol.

5.4. Action Sequences and Information Sets

In this paper, taking the cooperative type A c as an example, the action sequence Q c can be represented as
Q c = { , q u i t A , s e n d ( m 1 ) , s e n d ( a m 1 * ) , s e n d ( m 1 ) . s e n d ( m 2 ) , s e n d ( a m 1 * ) . s e n d ( m 2 ) , s e n d ( m 1 ) . q u i t B , s e n d ( a m 1 * ) . q u i t B , s e n d ( m 1 ) . s e n d ( m 2 ) . s e n d ( m 3 ) , s e n d ( m 1 ) . s e n d ( m 2 ) . q u i t A , s e n d ( a m 1 * ) . s e n d ( m 2 ) . q u i t A }
Then, the set of non-terminal sequences Q c \ Z can be represented as
Q c \ Z = { , s e n d ( m 1 ) , s e n d ( a m 1 * ) , s e n d ( m 1 ) . s e n d ( m 2 ) ,   s e n d ( a m 1 * ) . s e n d ( m 2 ) }
The participant function p is used to determine the next participant in a nonterminal sequence, which can be represented as follows:
A c = p ( ) = p ( s e n d ( m 1 ) . s e n d ( m 2 ) ) = p ( s e n d ( a m 1 * ) . s e n d ( m 2 ) ) B = p ( s e n d ( m 1 ) ) = p ( s e n d ( a m 1 * ) )
In this protocol, A only takes actions in the first and third steps. Since A has no prior information to refer to in the first step, the information set I A = { } of A is, and A can only update its own information set after observing B execute s e n d ( m 2 ) in the third step:
I A { s e n d ( m 1 ) . s e n d ( m 2 ) , s e n d ( a m 1 * ) . s e n d ( m 2 ) }
Participant B takes action in the second step and cannot know the type of A , so the information set of B is represented as
I B { s e n d ( m 1 ) c , s e n d ( m 1 ) n c , s e n d ( a m 1 * ) c , s e n d ( a m 1 * ) n c }

5.5. Utility Functions and Expected Payoffs

In the rational electronic contract signing protocol mentioned above, to maintain the authenticity of the information, it can be assumed that: if A sends an attack message a m * to B , and it is recognized by B , then A should be given a certain punishment F ; if it is not recognized by B , there will be no punishment. If B sends a signature to A , then A will gain a profit u A + ( B will suffer a loss of profit u B ). If A sends m 1 to B , then A will incur certain costs and suffer a certain loss of profit u A . Since B is always honest, there is no punishment value for B . If A sends m 3 to B , B will gain a profit u B + . Note that
F > u A + > u A > 0 , u B + > u B > 0
For this protocol, the utility function can be represented as
u A , u B : T A × q R
where u A and u B are the profits of participants A and B , respectively, T A is the type space of A , and q is the terminal action sequence.
In each terminal action sequence q , the pure profit of the cooperative type A c is as follows:
u A ( A c , q ) = u A ( A c , q u i t A ) = 0 u A ( A c , q ) = u A ( A c , s e n d ( m 1 ) . q u i t B ) = u A c u A ( A c , q ) = u A ( A c , s e n d ( a m 1 * ) . q u i t B ) = F u A ( A c , q ) = u A ( A c , s e n d ( m 1 ) . s e n d ( m 2 ) . s e n d ( m 3 ) ) = u A c + u A c u A ( A c , q ) = u A ( A c , s e n d ( m 1 ) . s e n d ( m 2 ) . q u i t A ) = u A c + u A c u A ( A c , q ) = u A ( A c , s e n d ( a m 1 * ) . s e n d ( m 2 ) . q u i t A ) = u A c +
Table 3 and Table 4 show the payoff matrices of the cooperative types A c and B , and non-cooperative types A n c and B , respectively. The horizontal axis represents the different pure strategies of A c and A n c in the protocol, and the vertical axis represents the different pure strategies of B in the protocol. The pure strategies of A and B together constitute each terminal action sequence in the protocol, and the table corresponds to the pure payoffs of each terminal action sequence A c and B , and A n c and B , respectively.
Based on the improved Buttyan model, by setting the types and beliefs of participants and elaborately describing the action sequences, information sets, and payoffs, we can precisely represent the rational electronic contract signing protocol as a game tree, as shown in Figure 7.
In the Buttyan model, the payoffs for A when taking action sequences s e n d ( m 1 * ) . s e n d ( m 2 ) . q u i t A and s e n d ( m 1 * ) . q u i t B are u A + F and F , respectively. Participant A will be penalized for sending the false message m 1 * to B , and the false information m 1 * is assumed to be recognizable by B . From the perspective of rational participants, false messages m 1 * that can be recognized by B do not need to be emphasized because B will always choose to exit the protocol to safeguard their own interests. On the contrary, false messages that are not recognized by participant B pose a potential threat to B . Therefore, the focus of the analysis in this paper is on the false messages that are not recognized.
Different strategies correspond to different payoffs. The following will discuss the expected payoffs of participants A and B under different pure strategies. For participant A :
E ( A c , ( s e n d ( m 1 ) , s e n d ( m 3 ) ) c ) = μ ( u A c + u A c ) + ( 1 μ ) ( u A c ) = μ u A c + u A c E ( A c , ( s e n d ( m 1 ) , q u i t A ) c ) = μ ( u A c + u A c ) + ( 1 μ ) ( u A c ) = μ u A c + u A c E ( A c , ( s e n d ( a m 1 * ) , q u i t A ) c ) = μ u A c + + ( 1 μ ) ( F ) = μ u A c + + μ F F E ( A c , ( q u i t A , ) c ) = 0 E ( A n c , ( s e n d ( m 1 ) , s e n d ( m 3 ) ) n c ) = μ ( u A c + u A c ) + ( 1 μ ) ( u A c ) = μ u A c + u A c E ( A n c , ( s e n d ( m 1 ) , q u i t A ) n c ) = μ ( u A c + u A c ) + ( 1 μ ) ( u A c ) = μ u A c + u A c E ( A n c , ( s e n d ( a m 1 * ) , q u i t A ) n c ) = μ u A c + + ( 1 μ ) ( F ) = μ u A c + + μ F F E ( A n c , ( q u i t A , ) n c ) = 0
From the expected payoffs mentioned above, when the type of A is A c , to ensure that participant A complies with the protocol rules and does not engage in fraudulent behavior, it is only necessary that:
E ( A c , ( s e n d ( m 1 ) , s e n d ( m 3 ) ) c ) E ( A c , ( s e n d ( a m 1 * ) , q u i t A ) c )
μ u A c + u A c μ u A c + + μ F F
That is,
μ 1 u A c F   ( μ > 0 )
When u A c remains constant, increasing the penalty value F means that the value of μ becomes larger. In other words, the probability of B sending message m 2 will increase, which is more conducive to the successful completion of the protocol. Therefore, during the contract signing process, appropriately increasing the penalty for sending attack messages can effectively encourage users to comply with the protocol. However, an excessively large penalty may backfire, as participants may be deterred by the high penalty and become reluctant to participate, thereby affecting the success rate of the protocol.
When the penalty value F remains unchanged, reducing the cost u A c means that the value of μ becomes larger. Therefore, in the signing of small contracts (where the cost A is low), user B is more likely to comply with the protocol. However, in the signing of large contracts, user B should be more cautious and improve their ability to identify false messages to ensure that both parties in the protocol comply as much as possible. This not only helps protect their own interests but also helps maintain the fairness and effectiveness of the contract.
Similarly, when the type of A is A n c , they will be more willing to comply with the protocol rules and avoid fraudulent behavior only when condition μ 1 u A c F   ( μ > 0 ) is satisfied. For participant B :
E ( B , q u i t B ) = 0 E ( B , m 2 ) = φ c ( ( 1 α c ) ( u B ) + α c ( β c ( u B + u B ) + ( 1 β c ) ( u B ) ) ) + φ n c ( ( 1 α n c ) ( u B ) + α n c ( β n c ( u B + u B ) + ( 1 β n c ) ( u B ) ) ) = u B + ( φ c α c β c + φ n c α n c β n c ) u B
It can be denoted that ( φ c α c β c + φ n c α n c β n c ) is represented by l . To ensure that participant B complies with the protocol rules, it is only necessary that E ( B , m 2 ) E ( B , q u i t B ) , that is,
l u B u B +         ( l > 0 )
Assign a set of values to φ c , α c , β c , φ n c , α n c , β n c , namely φ c = 0.80 , α c = 0.85 , β c = 0.80 , φ n c = 0.2 , α n c = 0.65 , β n c = 0.65 . The calculated result is l = 0.6285. The five groups of strategies for B ’s instances are shown in Table 5. The table shows the specific values of u B and u B + under different instance numbers, as well as the ratio of u B u B + and the corresponding strategy s B . For example, the value of u B in instance 1 is 3, the value of u B + is 8, and the ratio is 0.375. At this time, l   = 0.6285 > 0.3750, so B ’s strategy is s e n d ( m 2 ) . In the first three groups of instances, u B + is 8. As u B increases, the value of u B u B + increases, and the possibility of B choosing q u i t B increases, which is not conducive to the agreement. In the last three groups of instances, u B is 6. As u B + increases, the value of u B u B + decreases, and B is more willing to choose s e n d ( m 2 ) , which is more conducive to the agreement.
The following conclusions can be drawn from the table:
When l is fixed, the ratio of cost to benefit u B u B + should be minimized as much as possible; that is, increasing the benefit u B + and reducing the cost u B . When the ratio of cost to benefit B decreases, B will be more inclined to exchange signatures after weighing the pros and cons. On the one hand, increasing the benefit lets B see more room for profit and development opportunities, enhancing the motivation to participate; on the other hand, reducing the cost lowers the participation threshold and potential risks for B , alleviating concerns. This combined effect will effectively increase the success rate and execution efficiency of the protocol, promoting cooperation and win-win outcomes for both parties.
When u B u B + is fixed, increasing the value of l , that is, enhancing B ’s trust in A , makes B more willing to exchange signatures, which is another important factor in promoting the successful conclusion of the protocol.
The following are the strategy diagrams for participant A under parameter μ and participant B under parameter l , as shown in Figure 8. (a): When μ 1 u A F , participant A adopts the pure strategy s e n d ( m 1 ) , s e n d ( m 3 ) . (b): When l u B u B + , participant B adopts the pure strategy s e n d ( m 2 ) . Both parties interactively sign and reach an agreement.
In summary, both parties are willing to comply with the protocol rules only when μ 1 u A F   ( μ > 0 ) and l u B u B + ( l > 0 ) are satisfied simultaneously. In the process of signing electronic contract agreements, to ensure the cooperation and willingness of both parties, the agreement should include an appropriate penalty mechanism for sending false messages. In addition to this, it is also essential to enhance users’ ability to identify false messages. Furthermore, establishing a trust mechanism within the agreement can further strengthen both parties’ willingness to comply with the protocol.

6. Discussion

To better illustrate the advantages and unique features of our improved Buttyan model, we compare it with several existing security models, including the original Buttyan model, Alcaide’s rational exchange protocol model (referred to as the Alcaide model in this paper), Ding’s mixed strategy rational exchange protocol model (referred to as the Ding model in this paper), and Tao’s IoT protocol model (referred to as the Tao model in this paper). The comparison is conducted from multiple dimensions, such as handling uncertainty, handling false information, outcome fairness, process fairness, fraud prevention ability, and computational complexity. Table 6 shows the results of the comparison of different security models in multiple dimensions.
  • Handling uncertainty: The original Buttyan model assumes complete information and reliable networks, which is not realistic in real-life scenarios. Our model solves the problems of uncertainty and information asymmetry by introducing Bayesian games and increasing participant types and beliefs.
  • Handling attack messages: None of the existing models adequately handle attack messages or potential fraud. Our model introduces attack messages to simulate and analyze potential vulnerabilities, enhancing the robustness of the protocol.
  • Result and process fairness: While the original Buttyan and Alcaide models focus on outcome fairness, they ignore fairness in the protocol process. Our model ensures fairness of the results and processes by introducing Bayesian game and attack messages.
  • Fraud prevention capability: The original model lacks processing of false messages. Our model enhances fraud prevention capabilities by introducing attack messages and penalties for sending false information.
This study proposes an improved Buttyan model that aims to formally analyze rational exchange protocols, with a particular focus on improving the model’s ability to handle uncertainty and potential fraud. By introducing participant types and beliefs, the model is extended to more accurately reflect the complexity of real-world scenarios. In addition, the introduction of attack messages further enhances the model’s ability to simulate and analyze potential security vulnerabilities. The improved model is applied to rational electronic contract signing protocols, and a set of judgment conditions for evaluating whether users follow the protocol is obtained.
However, an important limitation of our model is the assumption that participant B is always honest. Although this assumption simplifies the analysis process, in real scenarios, participant B may have an incentive to deviate from honest behavior. This limitation limits the applicability of the model in dealing with scenarios where participant B may engage in fraudulent activities. Future research should consider relaxing this assumption and exploring mechanisms to deal with B ’s dishonest behavior, such as introducing reputation mechanisms or additional cryptographic techniques to ensure the integrity of the protocol. In addition, the current model is only applicable to two-party protocols, and extending it to multi-party scenarios can provide a more comprehensive framework for analyzing complex e-commerce transactions. Through experiments and actual tests, the effectiveness of the model can be verified, and the direction of improvement can be further determined.

7. Conclusions and Future Work

This paper proposes an improved Buttyan model. Through Bayesian game theory, it incorporates participant types and beliefs, expands the Buttyan model, and enhances the model’s ability to express real-world uncertainties. In addition, attack messages are introduced to simulate the potential fraudulent behavior of participants exploiting protocol security vulnerabilities. Finally, taking the rational electronic contract signing protocol as an example, the paper demonstrates how to apply the improved model for formal analysis and derives clear judgment conditions to assess whether users follow the protocol for transactions. The improved model is more in line with actual operating conditions and provides theoretical support for the design and optimization of e-commerce protocols.
In future research, there are two main directions for development: First, the analysis method can be extended to multi-party exchange protocols to enhance the security of e-commerce protocols [32,33]. Second, while the existing model has achieved certain results in theoretical design, there are still some shortcomings in practical application. For example, when facing complex real-world scenarios, the current model may not fully consider practical factors such as network latency and irrational behavior of participants, thereby affecting its adaptability and stability. To further improve the model’s practical adaptability, it can be verified and tested through experiments and practical applications.

Author Contributions

Conceptualization, M.X. and K.Y.; methodology, L.C.; formal analysis, L.C.; investigation, L.C. and K.Y.; writing—original draft preparation, L.C.; writing—review and editing, M.X. and Z.L.; supervision, K.Y. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (No. 62362033, 61962020), the Double Thousand Talent Plan of Jiangxi Province (No. jxsq2023201009), the Natural Science Foundation of Jiangxi Province (No. 20224ACB202006), and the Jiangxi Province Early Career Youth Science and Technology Talent Training Special Project (No. 20244BCE52146).

Data Availability Statement

The data supporting the findings of this study are available within the article.

Acknowledgments

The authors would like to express their sincere thanks to the reviewers for their valuable feedback and insightful comments.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

This appendix briefly explains how to apply the improved Buttyan model to the analysis process of actual e-commerce protocols through an electronic payment case. For the specific application process, please refer to Section 5 of the main text.
Figure A1 shows the process of electronic payment. Both parties to the agreement are rational. Seller A l i c e sends information such as item description and payment amount to the buyer B o b , and then the buyer pays the seller, and the seller finally sends the item or service to the buyer.
Figure A1. Electronic payment process.
Figure A1. Electronic payment process.
Symmetry 17 01033 g0a1
The improved Buttyan model in this paper mainly introduces participant types, beliefs, and attack messages. The details are as follows:
  • Define the types of sellers and buyers: Sellers can be divided into cooperative types and non-cooperative types. In the process of electronic payment, since buyers only pay for goods, there is no equal description of buyers. There is only one cooperative type, and they remain honest;
  • Define beliefs: In electronic contracts, naturally N assigns types to sellers with a certain probability and represents the messages sent with a certain probability;
  • Introduce attack messages: During the transaction, the seller may send an attack message (such as forged product information) to the buyer to mislead the buyer. Attack messages include false messages that the buyer can identify and false messages that the buyer cannot identify. For false messages identified by buyers, based on maximizing the interests of buyers, buyers should choose to exit the agreement in the second round; for false messages that cannot be identified, buyers continue to trade, and in the third round, based on maximizing the interests of sellers, sellers should choose to exit the agreement;
  • Calculate expected benefits: According to probability and net benefits, the expected benefits of sellers and buyers can be calculated, respectively. By comparing expected benefits, the judgment conditions for reaching two sets of agreements can be obtained. These conditions ensure that participants have an incentive to follow the protocol given their beliefs and strategies.
  • Through a series of steps, the improved Buttyan model is able to more accurately simulate uncertainty in reality, thus providing a more comprehensive perspective for the security analysis of electronic payment protocols.

References

  1. Shen, Y.; Shepherd, C.; Ahmed, C.M.; Shen, S.; Wu, X.; Ke, W.; Yu, S. Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 2024, 133, 108449. [Google Scholar] [CrossRef]
  2. Zhang, Y.; Zhang, C.; Pang, J.; Mauw, S. Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 2012, 8, 111–124. [Google Scholar] [CrossRef]
  3. Xu, G.; Zhang, Y.; Sangaiah, A.K.; Li, X.; Castiglione, A.; Zheng, X. CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 2019, 476, 505–515. [Google Scholar] [CrossRef]
  4. Maitra, A.; De, S.J.; Paul, G.; Pal, A.K. Proposal for quantum rational secret sharing. Phys. Rev. A 2015, 92, 022305. [Google Scholar] [CrossRef]
  5. Harn, L.; Lin, C.; Li, Y. Fair secret reconstruction in (t, n) secret sharing. J. Inf. Secur. Appl. 2015, 23, 1–7. [Google Scholar] [CrossRef]
  6. Abate, A.; Gutierrez, J.; Hammond, L.; Harrenstein, P.; Kwiatkowska, M.; Najib, M.; Perelli, G.; Steeples, T.; Wooldridge, M. Rational verification: Game-theoretic verification of multi-agent systems. Appl. Intell. 2021, 51, 6569–6584. [Google Scholar] [CrossRef]
  7. Zhao, B.; Liu, X.; Song, A.; Chen, W.-N.; Lai, K.-K.; Zhang, J.; Deng, R.H. Primpso: A privacy-preserving multiagent particle swarm optimization algorithm. IEEE Trans. Cybern. 2022, 53, 7136–7149. [Google Scholar] [CrossRef]
  8. Syverson, P. Weakly secret bit commitment: Applications to lotteries and fair exchange. In Proceedings of the 11th IEEE Computer Security Foundations Workshop, Rockport, MA, USA, 9–11 June 1998; pp. 2–13. [Google Scholar]
  9. Buttyán, L.; Hubaux, J.-P.; Čapkun, S. A formal model of rational exchange and its application to the analysis of Syverson’s protocol. J. Comput. Secur. 2004, 12, 551–587. [Google Scholar] [CrossRef]
  10. Alcaide, A.; Estevez-Tapiador, J.M.; Hernandez-Castro, J.C.; Ribagorda, A. A multi-party rational exchange protocol. In Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, Vilamoura, Portugal, 25–30 November 2007; pp. 42–43. [Google Scholar]
  11. Estevez-Tapiador, J.M.; Alcaide, A.; Hernandez-Castro, J.C.; Ribagorda, A. Bayesian rational exchange. Int. J. Inf. Secur. 2008, 7, 85–100. [Google Scholar] [CrossRef]
  12. Mittelmann, M.; Maubert, B.; Murano, A.; Perrussel, L. Formal verification of bayesian mechanisms. In Proceedings of the 37th AAAI Conference on Artificial Intelligence, Washington, DC, USA, 7–14 February 2023; pp. 11621–11629. [Google Scholar]
  13. Liu, L.; Zhang, L.; Liao, S.; Liu, J.; Wang, Z. A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense. Inf. Sci. 2021, 577, 245–264. [Google Scholar] [CrossRef]
  14. Cai, L.; Dai, Y.; Hu, Q.; Zhou, J.; Zhang, Y.; Jiang, T. Bayesian Game-Driven Incentive Mechanism for Blockchain-Enabled Secure Federated Learning in 6 G Wireless Networks. IEEE Trans. Netw. Sci. Eng. 2024, 11, 4951–4964. [Google Scholar] [CrossRef]
  15. Dahiya, A.; Gupta, B.B. A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense. Future Gener. Comp. Syst. 2021, 117, 193–204. [Google Scholar] [CrossRef]
  16. Kumari, P.; Gupta, H.P.; Dutta, T. A Bayesian game based approach for associating the nodes to the gateway in LoRa network. IEEE Trans. Intell. Transp. Syst. 2021, 23, 4583–4592. [Google Scholar] [CrossRef]
  17. Chen, X.; Feng, W.; Luo, Y.; Shen, M.; Ge, N.; Wang, X. Defending against link flooding attacks in internet of things: A bayesian game approach. IEEE Internet Things J. 2021, 9, 117–128. [Google Scholar] [CrossRef]
  18. Ding, H.; Peng, C.; Kuang, Q. A Rational Exchange Protocol Model under Mixed Strategies. J. Netw. Inf. Secur. 2016, 2, 68–75. (In Chinese) [Google Scholar]
  19. Tao, X.; Li, G.; Sun, D.; Cai, H. A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds. Future Gener. Comp. Syst. 2017, 76, 582–589. [Google Scholar] [CrossRef]
  20. Lohr, M.; Skiba, K.; Konersmann, M.; Jürjens, J.; Staab, S. Formalizing cost fairness for two-party exchange protocols using game theory and applications to blockchain. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Shanghai, China, 2–5 May 2022; pp. 1–5. [Google Scholar]
  21. Cai, L.; Luo, L.; Li, Z.; Xiong, Z. A game-based dynamic clustering routing strategy for mobile wireless sensor networks. IEEE Internet Things J. 2024, 11, 26481–26491. [Google Scholar] [CrossRef]
  22. Lv, Z.; Peng, C.; Peng, Y.; Zhang, J.; Computing, M. A rational exchange protocol under asymmetric information in wireless sensor networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9437936. [Google Scholar] [CrossRef]
  23. Luo, J.R.; Zhang, W.P.; Su, J.M.; Yuan, W.L.; Chen, J. Research Progress on Multi-Agent Game Learning. Syst. Eng. Electron. 2024, 46, 1628–1655. (In Chinese) [Google Scholar]
  24. Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.-C.; Kim, D.I. A survey on applications of game theory in blockchain. arXiv 2019. [Google Scholar] [CrossRef]
  25. Chen, Z.; Tian, Y.; Peng, C. An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci. China Inf. Sci. 2021, 64, 202301. [Google Scholar] [CrossRef]
  26. Yan, X.; Huang, C.; Gan, J.; Wu, X. Game theory-based energy-efficient clustering algorithm for wireless sensor networks. Sensors 2022, 22, 478. [Google Scholar] [CrossRef] [PubMed]
  27. Tian, Y.; Ma, J.; Peng, C.; Chen, X.; Ji, W. One-time rational secret sharing scheme based on bayesian game. Wuhan Univ. J. Nat. Sci. 2011, 16, 430–434. [Google Scholar] [CrossRef]
  28. Bonanno, G. Rational Play in Extensive-Form Games. Games 2022, 13, 72. [Google Scholar] [CrossRef]
  29. Fang, H.; Yi, P. Adaptive Decision-Making in Attack-Defense Games with Bayesian Inference of Rationality Level. IEEE Trans. Ind. Electron. 2024, 71, 16558–16567. [Google Scholar] [CrossRef]
  30. Wu, Y.; Feng, G.; Wang, N.; Liang, H. Game of information security investment: Impact of attack types and network vulnerability. Expert Syst. Appl. 2015, 42, 6132–6146. [Google Scholar] [CrossRef]
  31. Kremer, S.; Raskin, J.-F. Game analysis of abuse-free contract signing. In Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, 24–26 June 2002; pp. 206–220. [Google Scholar]
  32. Heng, S.-H.; Tan, S.-Y. A survey on optimistic fair exchange protocol and its variants. In Proceedings of the 2017 5th International Conference on Information and Communication Technology, Melaka, Malaysia, 17–19 May 2017; pp. 1–6. [Google Scholar]
  33. Ouyang, Y.; Tavafoghi, H.; Teneketzis, D. Dynamic games with asymmetric information: Common information based perfect bayesian equilibria and sequential decomposition. IEEE Trans. Autom. Control 2016, 62, 222–237. [Google Scholar] [CrossRef]
Figure 1. Interaction process of the Syverson protocol.
Figure 1. Interaction process of the Syverson protocol.
Symmetry 17 01033 g001
Figure 2. Game tree description of the Syverson protocol by the Buttyan model.
Figure 2. Game tree description of the Syverson protocol by the Buttyan model.
Symmetry 17 01033 g002
Figure 3. The game tree description with the introduction of types and beliefs.
Figure 3. The game tree description with the introduction of types and beliefs.
Symmetry 17 01033 g003
Figure 4. The interaction diagram with the introduction of attack message a m * .
Figure 4. The interaction diagram with the introduction of attack message a m * .
Symmetry 17 01033 g004
Figure 5. Flowchart of Bayesian game analysis of the protocol.
Figure 5. Flowchart of Bayesian game analysis of the protocol.
Symmetry 17 01033 g005
Figure 6. Rational electronic contract signing protocol.
Figure 6. Rational electronic contract signing protocol.
Symmetry 17 01033 g006
Figure 7. Game tree description of the rational electronic contract signing protocol.
Figure 7. Game tree description of the rational electronic contract signing protocol.
Symmetry 17 01033 g007
Figure 8. (a) The strategy diagram of participant A under parameter μ ; (b) The strategy diagram of participant B under parameter l .
Figure 8. (a) The strategy diagram of participant A under parameter μ ; (b) The strategy diagram of participant B under parameter l .
Symmetry 17 01033 g008
Table 1. Notational Representation.
Table 1. Notational Representation.
NotationsThe Meaning of Notations
m , m 1 , m 2 , m 3 message
false message
m *
a m * attack message
i t e m A , i t e m B items
e n c ( ) encryption algorithm
d e s c i t e m A description of item A
k key
w ( ) secret commitment function
N Nature
A , B , i , j protocol participant
ρ belief set
φ , α , β , μ probability distribution
F A Participant A ’s penalty value
F penalty value
u i ( · ) utility function
u B + , u A + The payoffs for participants A and B
u B , u A The costs for participants A and B
p r ( ) probability function
Θ ( ) belief function
S i strategy set of participant i
s strategy profile
T i type space of participant i
t i type of participant i
Table 2. Abbreviations/main notations.
Table 2. Abbreviations/main notations.
Abbreviations/NotationsThe Meaning of Abbreviations/Notations
K A 1 , K B 1 private keys of A and B
d e s c S i g A ( E c o n t r a c t ) contract signature description
S i g A ( E c o n t r a c t ) , S i g B ( E c o n t r a c t ) contract signatures of A and B
k random number
A c , A n c cooperative type A , non-cooperative type A
B c cooperative type B
T A , T B the type spaces of A and B
A A , A B the action sets of A and B
φ c , α c , β c probability of the cooperative type
φ n c , α n c , β n c probability of the non-cooperative type
μ the probability of participant B sending m 2
E expected payoff
p r ( ) probability function
S A , S B strategy set of A and B
s strategy profile
s A , s B pure strategies of A and B
I A , I B Information sets of A and B
and
or
s e n d ( ) send message
TTPTrusted Third Party
PSLProbabilistic Strategy Logic
PBNE Perfect Bayesian Nash Equilibrium
IoTInternet of Things
CMPContract Management Party
Table 3. The payoff matrix of A c and B .
Table 3. The payoff matrix of A c and B .
A c ( s e n d ( m 1 ) , s e n d ( m 3 ) ) c
( α c β c )
( s e n d ( m 1 ) , q u i t A ) c
( α c ( 1 β c ) )
( s e n d ( a m 1 * ) , q u i t A ) c
( ( 1 α c ) ( 1 β c ) )
B
m 2 ( μ ) ( u A c + u A c , u B + u B ) ( u A c + u A c , u B ) ( u A c + , u B )
q u i t B ( 1 μ ) ( u A c , 0 ) ( u A c , 0 ) ( F , 0 )
Table 4. The payoff matrix of A n c and B .
Table 4. The payoff matrix of A n c and B .
A n c ( s e n d ( m 1 ) , s e n d ( m 3 ) ) n c
( α c β c )
( s e n d ( m 1 ) , q u i t A ) n c
( α c ( 1 β c ) )
( s e n d ( a m 1 * ) , q u i t A ) n c
( ( 1 α c ) ( 1 β c ) )
B
m 2 ( μ ) ( u A c + u A c , u B + u B ) ( u A c + u A c , u B ) ( u A c + , u B )
q u i t B ( 1 μ ) ( u A c , 0 ) ( u A c , 0 ) ( F , 0 )
Table 5. Strategy Table for B ’s Instances.
Table 5. Strategy Table for B ’s Instances.
Instance Number u B u B + u B u B + s B
1380.375 s e n d ( m 2 )
2480.5 s e n d ( m 2 )
3680.75 q u i t B
46100.6 s e n d ( m 2 )
56120.5 s e n d ( m 2 )
Table 6. Comparison results of different security models.
Table 6. Comparison results of different security models.
Comparison DimensionsOriginal Buttyan ModelAlcaide ModelDing ModelTao ModelOur Model
Handling uncertainty×××
Handling attack messages××××
Result fairness
Process fairness×××
Fraud prevention capability××××
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xiao, M.; Chen, L.; Yang, K.; Li, Z. Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry 2025, 17, 1033. https://doi.org/10.3390/sym17071033

AMA Style

Xiao M, Chen L, Yang K, Li Z. Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry. 2025; 17(7):1033. https://doi.org/10.3390/sym17071033

Chicago/Turabian Style

Xiao, Meihua, Lina Chen, Ke Yang, and Zehuan Li. 2025. "Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model" Symmetry 17, no. 7: 1033. https://doi.org/10.3390/sym17071033

APA Style

Xiao, M., Chen, L., Yang, K., & Li, Z. (2025). Formal Analysis of Rational Exchange Protocols Based on the Improved Buttyan Model. Symmetry, 17(7), 1033. https://doi.org/10.3390/sym17071033

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop