We study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced risks on the participants. We also present a risk-balanced protocol for fair confidential secret comparison.
Security and Protection (acm D.4.6)
Software (theme 1)
Springer
I. Cervesato
Lecture Notes in Computer Science
Computer and Network Security, Asian Computing Science Conference
Specification and Analysis of Embedded Systems

Dashti, M.T, & Wang, Y. (2007). Risk Balance in Exchange Protocols. In I Cervesato (Ed.), Advances in Computer Science - ASIAN 2007 (pp. 70–77). Springer.