Fairness in the presence of semi-rational parties in rational two-party secure computation

被引:0
|
作者
机构
[1] Sun, Zhonghong
关键词
Adversary modeling - Fairness - Nash equilibria - Real-world - Secure computation - Semi-rational party;
D O I
10.1504/IJGUC.2013.056245
中图分类号
学科分类号
摘要
Reputation is commonly used in game theory for mutual cooperation. Assuming that parties value their reputation as well as their payoffs just like people in the real world, this paper considers reputation assumptions when defining the utilities. The new utility consists of two parts: the reputation part and payoff part. The parties are redefined according to the new utility definition. Besides, to represent a more realistic adversary model, a new adversary named semirational party is proposed. The semi-rational parties behave like the combination of rational and covert parties. At last, a rational two-party secure computation protocol is constructed. The proof of fairness in the presence of the semi-rational party is stressed in this paper. Copyright © 2013 Inderscience Enterprises Ltd.
引用
收藏
页码:2 / 3
相关论文
共 50 条
  • [31] LEGO for Two-Party Secure Computation
    Nielsen, Jesper Buus
    Orlandi, Claudio
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 368 - 386
  • [32] On the Power of Secure Two-Party Computation
    Carmit Hazay
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2020, 33 : 271 - 318
  • [33] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    JOURNAL OF CRYPTOLOGY, 2020, 33 (01) : 271 - 318
  • [34] Rational and Semi-Rational Solutions to the (2
    Zhang, Yong
    Dong, Huan-He
    Fang, Yong
    AXIOMS, 2022, 11 (09)
  • [35] A brief survey on secure multi-party computing in the presence of rational parties
    Wang, Yilei
    Li, Tao
    Qin, Hairong
    Li, Jin
    Gao, Wei
    Liu, Zhe
    Xu, Qiuliang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 807 - 824
  • [36] A brief survey on secure multi-party computing in the presence of rational parties
    Yilei Wang
    Tao Li
    Hairong Qin
    Jin Li
    Wei Gao
    Zhe Liu
    Qiuliang Xu
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 807 - 824
  • [37] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Yehuda Lindell
    Benny Pinkas
    Journal of Cryptology, 2015, 28 : 312 - 350
  • [38] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [39] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [40] On Secure Two-Party Computation in Three Rounds
    Ananth, Prabhanjan
    Jain, Abhishek
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 612 - 644