Fairness in the presence of semi-rational parties in rational two-party secure computation

被引:0
|
作者
机构
[1] Sun, Zhonghong
关键词
Adversary modeling - Fairness - Nash equilibria - Real-world - Secure computation - Semi-rational party;
D O I
10.1504/IJGUC.2013.056245
中图分类号
学科分类号
摘要
Reputation is commonly used in game theory for mutual cooperation. Assuming that parties value their reputation as well as their payoffs just like people in the real world, this paper considers reputation assumptions when defining the utilities. The new utility consists of two parts: the reputation part and payoff part. The parties are redefined according to the new utility definition. Besides, to represent a more realistic adversary model, a new adversary named semirational party is proposed. The semi-rational parties behave like the combination of rational and covert parties. At last, a rational two-party secure computation protocol is constructed. The proof of fairness in the presence of the semi-rational party is stressed in this paper. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:2 / 3
相关论文
共 50 条
  • [21] Secure Two-Party Computation with Fairness - A Necessary Design Principle
    Lindell, Yehuda
    Rabin, Tal
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 565 - 580
  • [22] DE-RSTC: A rational secure two-party computation protocol based on direction entropy
    Chen, Yuling
    Ma, Juan
    Wang, Xianmin
    Zhang, Xinyu
    Zhou, Huiyu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) : 8947 - 8967
  • [23] A rational and reliable model for outsourcing polynomial two-party computation
    Chen, Zhiyin
    Tian, Youliang
    Zhou, Feng
    Xiong, Wei
    Yang, Ze
    Wang, Shuai
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
  • [24] COMPLETE CHARACTERIZATION OF FAIRNESS IN SECURE TWO-PARTY COMPUTATION OF BOOLEAN FUNCTIONS∗
    Asharov, Gilad
    Beimel, Amos
    Makriyannis, Nikolaos
    Omri, Eran
    SIAM Journal on Computing, 2024, 53 (05) : 1381 - 1408
  • [25] Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
    Asharov, Gilad
    Beimel, Amos
    Makriyannis, Nikolaos
    Omri, Eran
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 199 - 228
  • [26] Hidden Δ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
    Bayreuther, Saskia
    Berger, Robin
    Doerre, Felix
    Mechler, Jeremias
    Mueller-Quade, Joern
    INFORMATION SECURITY AND PRIVACY, PT II, ACISP 2024, 2024, 14896 : 330 - 349
  • [27] Geometry of Secure Two-party Computation
    Basu, Saugata
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    2022 IEEE 63RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2022, : 1035 - 1044
  • [28] Secure Two-Party Computation Is Practical
    Pinkas, Benny
    Schneider, Thomas
    Smart, Nigel P.
    Williams, Stephen C.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
  • [29] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [30] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429