• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang En, Cai Yongquan. Rational Secure Two-Party Computation Protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.
Citation: Zhang En, Cai Yongquan. Rational Secure Two-Party Computation Protocol[J]. Journal of Computer Research and Development, 2013, 50(7): 1409-1417.

Rational Secure Two-Party Computation Protocol

More Information
  • Published Date: July 14, 2013
  • In the setting of traditional secure two-party computation, one party may either tell a wrong output to the other party or abort the protocol after he obtains the computation output. So, completed fairness can not be achieved. To address this problem, combining game theory with cryptography, a rational secure two-party computation protocol is proposed in this paper. Firstly, we suppose that any rational party would prefer getting the computation output to not getting it and secondly, it is preferred that as few as possible of the other players get it. Then, game strategies, utilities, and motivations that participants deviate from the protocol or abide by the protocol are researched, and a game model for secure two-party computation is constructed. In the protocol, it is a best strategy for parties to abide by the protocol. The cheating of party can be detected and the gain of the following the protocol is more than the gain of deviating, so rational party has incentive to abiding by the protocol. Finally, every party can obtain the computation result. Analysis shows that the protocol is secure and fair.
  • Related Articles

    [1]Shi Jianzhi, Wang Xingwei, Yi Bo. Analysis Method of the JointCloud Resource Market: A Game-Theoretic Approach[J]. Journal of Computer Research and Development, 2023, 60(9): 1988-1999. DOI: 10.7544/issn1000-1239.202330411
    [2]Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan. A Link Prediction Approach in Temporal Networks Based on Game Theory[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964. DOI: 10.7544/issn1000-1239.2019.20180842
    [3]Dai Wangzhou, Zhou Zhihua. A Survey on Inductive Logic Programming[J]. Journal of Computer Research and Development, 2019, 56(1): 138-154. DOI: 10.7544/issn1000-1239.2019.20180759
    [4]Wang Bo, Liu Jinglei. An Algorithm for Computing Core of Boolean Game[J]. Journal of Computer Research and Development, 2018, 55(8): 1735-1750. DOI: 10.7544/issn1000-1239.2018.20180360
    [5]Wu Fan, Zheng Zhenzhe. Game Theory Based Spectrum Dynamic Management[J]. Journal of Computer Research and Development, 2016, 53(1): 38-52. DOI: 10.7544/issn1000-1239.2016.20150652
    [6]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [7]Mei Canhua, Zhang Yuhong, Hu Xuegang, and Li Peipei. A Weighted Algorithm of Inductive Transfer Learning Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2011, 48(9): 1722-1728.
    [8]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [9]Shi Jin, Lu Yin, and Xie Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008, 45(5): 747-757.
    [10]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.

Catalog

    Article views (1433) PDF downloads (1185) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return