Advanced Search
    Zhang En, Cai Yongquan. Rational Secure Two-Party Computation Protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.
    Citation: Zhang En, Cai Yongquan. Rational Secure Two-Party Computation Protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.

    Rational Secure Two-Party Computation Protocol

    • In the setting of traditional secure two-party computation, one party may either tell a wrong output to the other party or abort the protocol after he obtains the computation output. So, completed fairness can not be achieved. To address this problem, combining game theory with cryptography, a rational secure two-party computation protocol is proposed in this paper. Firstly, we suppose that any rational party would prefer getting the computation output to not getting it and secondly, it is preferred that as few as possible of the other players get it. Then, game strategies, utilities, and motivations that participants deviate from the protocol or abide by the protocol are researched, and a game model for secure two-party computation is constructed. In the protocol, it is a best strategy for parties to abide by the protocol. The cheating of party can be detected and the gain of the following the protocol is more than the gain of deviating, so rational party has incentive to abiding by the protocol. Finally, every party can obtain the computation result. Analysis shows that the protocol is secure and fair.
    • loading

    Catalog

      Turn off MathJax
      Article Contents

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return