期刊文献+

秘密共享体制的博弈论分析 被引量:26

Game-Theoretic Analysis for the Secret Sharing Scheme
下载PDF
导出
摘要 本文提出理性第三方的概念,在秘密共享中任何理性的局中人都可以充当"可信中心"来分发秘密信息,这样使秘密共享体制更具有普适性.基于博弈论分析秘密分发协议,它被形式化为n个二人博弈.证明在这些博弈中,理性秘密分发者总是选择欺骗各局中人以获得更大的收益,同时提出解决该问题的理性秘密分发机制.最后,基于健忘传输协议提出秘密重构机制,有效解决秘密重构中各局中人的不合作问题. This paper proposes the concept of rational trusted party.Any rational party can be the TTP to distribute the shares in the secret sharing such that it is to be more suitable for use.As far as we know,that is firstly to analyze distribution of shares with game theory in secret sharing scheme.It is formalized as n tow-person games.It is proven that rational dealer always selects cheating all players to get more payoffs in these games.Simultaneously a rational secret distribution mechanism is proposed to solve this problem.Moreover,we construct a mechanism of reconstruction of secret based on oblivious transfer protocol,which solve the problem of players' non-cooperation in reconstruction phase.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第12期2790-2795,共6页 Acta Electronica Sinica
基金 国家科技部重大专项(No.2011ZX03005-002) 国家自然科学基金(No.60872041 No.61072066 No.60963023 No.60970143) 中央高校基本科研业务费项目(No.JY10000903001 No.JY10000901034)
关键词 博弈论 纳什均衡 秘密共享 理性第三方 game theory Nash equilibrium secret sharing rational third party
  • 相关文献

参考文献7

  • 1Halpem J, Teague V. Rational secret sharing and multiparty computation: extended abstract [ A ]. Proceedings of the 36th Annual ACM Symposium on Theory of Computing[ C]. New York, USA: ACM,2004.623 - 632.
  • 2Abraham I,Dolev D, Gonen R, Halpem J. Distributed comput- ing meets game theory:Robust mechanisms for rational secret sharing and multiparty computation [ A ]. Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Compufing[ C] .New York, USA: ACM,2006.53 - 62.
  • 3Lysyanskaya A, Triandopoulos N. Rationality and adversarial behaviour in multi-party computation (extended abstract )[ A]. CRYPIO2006[ C] .Heidelberg: Springer,2006.180 - 197.
  • 4Maleka S, Amjed S, Pandu Rangan C. Rational secret sharing with repeated games [ A ]. ISPEC2008 [ C ]. Heidelberg: Springer, 2008. 334 - 346.
  • 5Asharov G, Lindell Y. Utility dependence in correct and fair ra- tional secret sharing [ A ]. CRYtrIO2009 [ C ]. Heidelberg: Springer, 2009.559 - 576.
  • 6陈晶,杜瑞颖,王丽娜,田在荣.网络环境下一种基于概率密度的信任博弈模型[J].电子学报,2010,38(2):427-433. 被引量:14
  • 7Osborne M.An Introduction to Game Theory[M]. Oxfor: Ox- ford University Press,2004.

二级参考文献13

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Chang E, Thomson P, Dillon T et al. The fuzzy and dynamic nature of trust[ A ]. LNCS 3592[ C ]. Berlin: Springer-Verlag, 2005.161 - 174.
  • 3Marsh S. Formalizing Trust as a Computational Concept[ D ]. University of Stifling, 1994.
  • 4Golbeck J. Computing and Applying Trust in Web-Based Social Networks[ D]. University of Maryland, College Park,2005.
  • 5Koutrouli E, Tsalgatidou A. Reputation-based trust systems for P2P applications:design issues and comparison framework[A]. LNCS4083 [ C]. Berlin: Springer-Vedag, 2006.152 - 161.
  • 6Almenarez F,Marin A,Campo C. TrustAC: Trust-Based access control for pervasive devices [ A ]. LNCS 450 [C ]. Berlin: Springer-Verlag. 2005. 225 - 238.
  • 7Jameel H, Hung L X, Kalim U. A trust model for ubiquitous systems based on vectors of mist values[ A ]. In Proceedings of the 7th IEEE Int'l Sympon Multimedia[C] .Washington: IEEE Computer Society Press.2005.674 - 679.
  • 8Papapanagiotou K, Marias G F, Georgiadis P. Performance evaluation of a distributed OCSP protocol over MANETs[ A]. In Proceedings of 3rd IEEE Consumer Communicafions and Networking Conference (CCNC ' 06) [ C ]. Las Vegas, USA: IEEE Press. 2006. 1 - 5.
  • 9Hu Y C, Perrig A, Johnson D B. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks[ A]. In Proceedings of the 8th International Conference Mobile Computing and Networking[ C] .ACM Press. 2002.12- 23.
  • 10Yi S, Naldurg P, Kravets R. A security-aware routing protocol for wireless ad hoc networks [ A ]. In Proceeding of the 6th World Multi-conference on Systemics, Cybernetics and Informatics[ C]. USA: IEEE Press. 2002.226- 236.

共引文献13

同被引文献220

引证文献26

二级引证文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部