Fairness in the presence of semi-rational parties in rational two-party secure computation

被引:0
|
作者
机构
[1] Sun, Zhonghong
关键词
Adversary modeling - Fairness - Nash equilibria - Real-world - Secure computation - Semi-rational party;
D O I
10.1504/IJGUC.2013.056245
中图分类号
学科分类号
摘要
Reputation is commonly used in game theory for mutual cooperation. Assuming that parties value their reputation as well as their payoffs just like people in the real world, this paper considers reputation assumptions when defining the utilities. The new utility consists of two parts: the reputation part and payoff part. The parties are redefined according to the new utility definition. Besides, to represent a more realistic adversary model, a new adversary named semirational party is proposed. The semi-rational parties behave like the combination of rational and covert parties. At last, a rational two-party secure computation protocol is constructed. The proof of fairness in the presence of the semi-rational party is stressed in this paper. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:2 / 3
相关论文
共 50 条
  • [1] Fairness in the presence of semi-rational parties in rational two-party secure computation
    Sun, Zhonghong
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 103 - 109
  • [2] Rational secure two-party computation protocol
    Zhang, En
    Cai, Yongquan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1409 - 1417
  • [3] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [4] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483
  • [5] Rational adversary with flexible utility in secure two-party computation
    Wang, Yilei
    Zhang, Shuaifeng
    Tang, Yi
    Su, Qingtang
    Chen, Beijing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) : 2913 - 2927
  • [6] Rational adversary with flexible utility in secure two-party computation
    Yilei Wang
    Shuaifeng Zhang
    Yi Tang
    Qingtang Su
    Beijing Chen
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2913 - 2927
  • [7] Fair two-party computation with rational parties holding private types
    Wang, Yilei
    Wong, Duncan S.
    Zhao, Chuan
    Xu, Qiuliang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 284 - 297
  • [8] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +
  • [9] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 157 - 176
  • [10] A new entropic criterion model in rational secure two-party computation
    Xinyu Zhang
    Yujun Liu
    Yuling Chen
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1363 - 1372