• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
Citation: Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.

Game-Theoretic Mechanism for Cryptographic Protocol

More Information
  • Published Date: February 14, 2014
  • Both game theory and secure communication protocols focus on the designing and analyzing mechanisms for parties in a collaborative manner. Yet the two fields developed very different sets of goals and formalisms. This paper studies the secure communication protocol problem in the game-theoretic setting. The goal of this paper is to formulate computation and communication rules of a secure communication protocol based on Nash equilibrium in the game-theoretic framework. We firstly propose a game-theoretic model of secure protocols, including the player set, information set, available action, action sequence, player function, and utility function using the idea from universally composable security. Since our mode combines with the universally composable ideal, secure protocols can be concurrently run within this model. Secondly, the formalized definition of secure protocols is given according to concept of Nash equilibrium. Thirdly, we give an instance of secure protocol under the game-theoretic mechanism. Finally, the analysis shows that our mechanism is effective.
  • Related Articles

    [1]Liu Sheng, Lu Kai, Guo Yang, Liu Zhong, Chen Haiyan, Lei Yuanwu, Sun Haiyan, Yang Qianming, Chen Xiaowen, Chen Shenggang, Liu Biwei, Lu Jianzhuang. A Self-Designed Heterogeneous Accelerator for Exascale High Performance Computing[J]. Journal of Computer Research and Development, 2021, 58(6): 1234-1237. DOI: 10.7544/issn1000-1239.2021.20210189
    [2]Zheng Fang, Shen Li, Li Hongliang, Xie Xianghui. Lightweight Error Recovery Techniques of Many-Core Processor in High Performance Computing[J]. Journal of Computer Research and Development, 2015, 52(6): 1316-1328. DOI: 10.7544/issn1000-1239.2015.20150119
    [3]Liu Song, Wu Weiguo, Zhao Bo, Jiang Qing. Loop Tiling for Optimization of Locality and Parallelism[J]. Journal of Computer Research and Development, 2015, 52(5): 1160-1176. DOI: 10.7544/issn1000-1239.2015.20131387
    [4]Wang Kai, Chen Fei, Li Qiang, Li Xiaomin, An Xuejun, Sun Ninghui. Research on Hyper-Node Controller for High Performance Computer[J]. Journal of Computer Research and Development, 2011, 48(1): 1-8.
    [5]Huang Yongqin, Jin Lifeng, and Liu Yao. Current Situation and Trend of Reliability Technology in High Performance Computers[J]. Journal of Computer Research and Development, 2010, 47(4): 589-594.
    [6]Wang Zhen, Jiang Jianhui, and Yuan Chunxin. Error-Correcting Techniques for High-Performance Processors[J]. Journal of Computer Research and Development, 2008, 45(2): 358-366.
    [7]Tu Bibo, Hong Xuehai, Zhan Jianfeng, Fan Jianping. Workflow-Based User Environment for High Performance Computing[J]. Journal of Computer Research and Development, 2007, 44(10): 1717-1723.
    [8]Zhao Yi, Zhu Peng, Chi Xuebin, Niu Tie, and Cao Zongyan. A Brief View on Requirements and Development of High Performance Computing Application[J]. Journal of Computer Research and Development, 2007, 44(10): 1640-1646.
    [9]Feng Shengzhong, Tan Guangming, Xu Lin, Sun Ninghui, Xu Zhiwei. Research on the High Performance Algorithms of Dawning 4000H Bioinformatics Specific Machine[J]. Journal of Computer Research and Development, 2005, 42(6): 1053-1058.
    [10]Xie Xianghui, Peng Longgen, Wu Zhibing, and Lu Deping. Research on High Performance Computer Technology Based on InfiniBand[J]. Journal of Computer Research and Development, 2005, 42(6): 905-912.

Catalog

    Article views (1051) PDF downloads (580) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return