Strategic and secure interactions in networks

The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an inter...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Tan, Jinsong
Médium: Dissertation
Jazyk:angličtina
Vydáno: ProQuest Dissertations & Theses 01.01.2010
Témata:
ISBN:1124530290, 9781124530291
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an interdisciplinary approach by drawing on theories and models from economics, sociology, as well as computer science, and using methodologies that include both theories and behavioral experiments. First, we consider biased voting in networks, which models distributed collective decision making processes where individuals in a network must balance between their private biases or preferences with a collective goal of consensus. Our study of this problem is two-folded. On the theoretical side, we start by introducing a diffusion model called biased voter model, which is a natural extension of the classic voter model. Among other results, we show in the presence of biases, no matter how small, there exists certain networks where it takes exponential time to converge to a consensus through distributed interaction in networks. This is a stark and interesting contrast to the well-known result that it always takes polynomial time to converge in the voter model, when there are no biases. On the experimental side, a group human subjects were arranged in various carefully designed virtual networks to solve the biased voting problem. Along with analyses of how collective and individual performance vary with network structure and incentives generally, we find there are well-studied network topologies in which the minority preference consistently wins globally, and that the presence of "extremist" individuals, or the awareness of opposing incentives, reliably improve collective performance. Second, we consider bargaining in networks, which has long been studied by economists and sociologists. A basic premise behind the many theoretical study of bargaining in networks is that pure topological differences in agents' network positions endow them with different bargaining power. Complementary to these theories, we conduct a series of controlled behavioral experiments, where human subjects were arranged in various carefully designed virtual networks to playing bargaining games. Along with other findings of how individual and collective performance vary with network structures and individual playing styles, we find that the number of neighbors one can negotiate with confers bargaining power, whereas the limit on the number of deals one can close undermines it, and we find that competitions from distant parts of the network, though invisible locally, also play a significant and subtle role in shaping bargaining powers. And last, we consider the question of how interactions in networks can be made secure. Traditional methods and tools from cryptography, for example secure multi-party computation, can be applied only if each party can talk to everyone else directly; but cannot be directly applied if interactions are distributed over a network without completely eradicating the distributed nature. We develop a general 'compiler' that turns each algorithm from a broad class collectively known as message-passing algorithms into a secure one that has exactly the same functionality and communication pattern. And we show a fundamental trade-off between preserving the distributed nature of communication and the level of security one can hope for.
AbstractList The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining, on networks; and to understand how interactions can be made secure when they are constrained by the network topology. Our works take an interdisciplinary approach by drawing on theories and models from economics, sociology, as well as computer science, and using methodologies that include both theories and behavioral experiments. First, we consider biased voting in networks, which models distributed collective decision making processes where individuals in a network must balance between their private biases or preferences with a collective goal of consensus. Our study of this problem is two-folded. On the theoretical side, we start by introducing a diffusion model called biased voter model, which is a natural extension of the classic voter model. Among other results, we show in the presence of biases, no matter how small, there exists certain networks where it takes exponential time to converge to a consensus through distributed interaction in networks. This is a stark and interesting contrast to the well-known result that it always takes polynomial time to converge in the voter model, when there are no biases. On the experimental side, a group human subjects were arranged in various carefully designed virtual networks to solve the biased voting problem. Along with analyses of how collective and individual performance vary with network structure and incentives generally, we find there are well-studied network topologies in which the minority preference consistently wins globally, and that the presence of "extremist" individuals, or the awareness of opposing incentives, reliably improve collective performance. Second, we consider bargaining in networks, which has long been studied by economists and sociologists. A basic premise behind the many theoretical study of bargaining in networks is that pure topological differences in agents' network positions endow them with different bargaining power. Complementary to these theories, we conduct a series of controlled behavioral experiments, where human subjects were arranged in various carefully designed virtual networks to playing bargaining games. Along with other findings of how individual and collective performance vary with network structures and individual playing styles, we find that the number of neighbors one can negotiate with confers bargaining power, whereas the limit on the number of deals one can close undermines it, and we find that competitions from distant parts of the network, though invisible locally, also play a significant and subtle role in shaping bargaining powers. And last, we consider the question of how interactions in networks can be made secure. Traditional methods and tools from cryptography, for example secure multi-party computation, can be applied only if each party can talk to everyone else directly; but cannot be directly applied if interactions are distributed over a network without completely eradicating the distributed nature. We develop a general 'compiler' that turns each algorithm from a broad class collectively known as message-passing algorithms into a secure one that has exactly the same functionality and communication pattern. And we show a fundamental trade-off between preserving the distributed nature of communication and the level of security one can hope for.
Author Tan, Jinsong
Author_xml – sequence: 1
  givenname: Jinsong
  surname: Tan
  fullname: Tan, Jinsong
BookMark eNotjs1KAzEURgMqaMe-w-B-4ObmZ5KlFK1CoYt2XzKZGx2VpE0y-PoO1NXH2ZzzrdhtTJFu2IpzlEoAWrhn61KmAQCsECDxgXWHml2lj8m3Lo5tIT9naqdYKTtfpxTLAm2k-pvyd3lkd8H9FFr_b8OOry_HzVu322_fN8-77lNa2_WoAu-tRzSBHEjgo-0Hrl0ArgGVBsmDMAReO3Sg7AijQhqEpgEDatGwp6v2nNNlplJPX2nOcSmejDJgkC___wAaHz8M
ContentType Dissertation
Copyright Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Copyright_xml – notice: Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
DBID 053
054
0BH
0OR
AMEAF
CBPLH
EU9
G20
M8-
P6D
PHGZT
PKEHL
PQEST
PQQKQ
PQUKI
DatabaseName Dissertations & Theses Europe Full Text: Science & Technology
Dissertations & Theses Europe Full Text: Social Sciences
ProQuest Dissertations and Theses Professional
Dissertations & Theses @ University of Pennsylvania
ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection
ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection
ProQuest Dissertations & Theses A&I
ProQuest Dissertations & Theses Global
ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection
ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
DatabaseTitle ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition
ProQuest Dissertations & Theses Global: The Sciences and Engineering Collection
ProQuest Dissertations and Theses Professional
ProQuest Dissertations and Theses A&I: The Sciences and Engineering Collection
ProQuest Dissertations & Theses Global
Dissertations & Theses Europe Full Text: Science & Technology
Dissertations & Theses @ University of Pennsylvania
Dissertations & Theses Europe Full Text: Social Sciences
ProQuest One Academic UKI Edition
ProQuest Dissertations and Theses A&I: The Humanities and Social Sciences Collection
ProQuest One Academic
ProQuest Dissertations & Theses A&I
ProQuest One Academic (New)
DatabaseTitleList ProQuest Dissertations & Theses Global: The Humanities and Social Sciences Collection
Database_xml – sequence: 1
  dbid: G20
  name: ProQuest Dissertations & Theses Global
  url: https://www.proquest.com/pqdtglobal1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Economics
Computer Science
ExternalDocumentID 2298970901
Genre Dissertation/Thesis
GroupedDBID 053
054
0BH
0OR
8R4
8R5
AMEAF
CBPLH
EU9
G20
M8-
P6D
PHGZT
PKEHL
PQEST
PQQKQ
PQUKI
Q2X
ID FETCH-LOGICAL-h499-725f179c228fea0401d97b16af0160256041f38e0c6a2a059d0d52eb36eb2f263
IEDL.DBID G20
ISBN 1124530290
9781124530291
IngestDate Mon Jun 30 07:17:32 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-h499-725f179c228fea0401d97b16af0160256041f38e0c6a2a059d0d52eb36eb2f263
Notes SourceType-Dissertations & Theses-1
ObjectType-Dissertation/Thesis-1
content type line 12
PQID 858082109
PQPubID 18750
ParticipantIDs proquest_journals_858082109
PublicationCentury 2000
PublicationDate 20100101
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – month: 01
  year: 2010
  text: 20100101
  day: 01
PublicationDecade 2010
PublicationYear 2010
Publisher ProQuest Dissertations & Theses
Publisher_xml – name: ProQuest Dissertations & Theses
SSID ssib000933042
Score 1.5276731
Snippet The goal of this dissertation is to understand how network plays a role in shaping certain strategic interactions, in particular biased voting and bargaining,...
SourceID proquest
SourceType Aggregation Database
SubjectTerms Behavioral Sciences
Computer science
Economics
Title Strategic and secure interactions in networks
URI https://www.proquest.com/docview/858082109
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60CoqHalXUquzBa3Dz2E1y8qAWT8VDD72VbB7oZatN9feb7CalIHjxGAIhTDKTeXyZD-CuLA1jhDukmlIgJpsKSUMiwlFH0Huwh9R1ZBN8OhXzuXxN2ByfYJXZJnaG2ix1zJHfi0qE1wqX8uHjE0XSqFhcTQwau7DHhaw65oZt72cTrAengkV6HJm7POUx_mWCu3dlMvznjo7h6Gmrnn4CO7YdwTAzNRRJcUdwkP8f-1NAuSGtLlRrCh8T7raIbSNW_ScHHwZF28PD_RnMJs-zxxeUSBPQWwheECeVCzqmCRHOqqCh2Eje4Fq52Eou-jcMOypsqWtFVPCtTGkqEiLqOoTYjtT0HAbtsrUXUBDHNeVUMy0cq7GSOsi4odqERYx19BLGWS6LdPH9YiOUqz9nx3DYl-FjLuMaBuvVl72Bff29fver2-4YfwApxKTZ
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V07T8MwED6VglTEUCggoDwywGiR2E5iD4iBUlq1VAwdukWJH4IlhaaA-E_8SOykriohsXVgtCxZke9yL393H8Cl70tKcaxRmvkMUZ6FiEtsEY7Cgt6NPSS6JJuIRyM2mfCnGny7XhgLq3Q2sTTUcipsjfyahcx4q8Dnt69vyJJG2cdVx6BRacVAfX2ajK246XeMeK8w7t6P73poQSqAnk1wj2IcaqODAmOmVWo0OJA8zoIo1XbUmvX_NNCEKV9EKU5N7CF9GWKTcUYmBdU4IubYDdikJA4sgPBhNdha1gZMDEMtGw93Q6XcOvhl8Us31m3-rwvYhZ3OClpgD2oqb0HT8VB4C7PUgobrri72Ablxu8JLc-kV9jlBeXYoxqxq4SjMwssr8HtxAON1fPwh1PNpro7AwzoWJCaCCqZpFKRcMB5mREhziFSaHEPbiSFZ_NZFspTByZ-7F9DojR-HybA_GrRhuwIc2KrNKdTns3d1BlviY_5SzM5LDfIgWbPAfgBTlv4z
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adissertation&rft.genre=dissertation&rft.title=Strategic+and+secure+interactions+in+networks&rft.DBID=053%3B054%3B0BH%3B0OR%3BAMEAF%3BCBPLH%3BEU9%3BG20%3BM8-%3BP6D%3BPHGZT%3BPKEHL%3BPQEST%3BPQQKQ%3BPQUKI&rft.PQPubID=18750&rft.au=Tan%2C+Jinsong&rft.date=2010-01-01&rft.pub=ProQuest+Dissertations+%26+Theses&rft.isbn=1124530290&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=2298970901
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781124530291/sc.gif&client=summon&freeimage=true