浏览全部资源
扫码关注微信
1. 东北大学计算机科学与工程学院,辽宁 沈阳 110819
2. 西安电子科技大学计算机科学与技术学院,陕西 西安 710126
3. 信息工程大学四院,河南 郑州 450001
4. 数学工程与先进计算国家重点实验室,河南 郑州 450001
5. 新疆财经大学应用数学学院,新疆 乌鲁木齐 830012
6. 东北大学秦皇岛分校计算机与通信工程学院,河北 秦皇岛 066004
[ "王佳琪(1989- ),女,吉林长春人,东北大学博士生,主要研究方向为网络信息安全、电子拍卖安全、频谱拍卖安全" ]
[ "鲁宁(1984- ),男,内蒙古包头人,博士,东北大学副教授,主要研究方向为网络安全" ]
[ "程庆丰(1979- ),男,辽宁朝阳人,博士,信息工程大学副教授,主要研究方向为公钥密码学、密码协议" ]
[ "巫朝霞(1975- ),女,广东揭西人,博士,新疆财经大学副教授,主要研究方向为信息安全" ]
[ "史闻博(1980- ),男,河北唐山人,博士,东北大学秦皇岛分校教授,主要研究方向为应用密码学、网络安全、信息系统安全、网络攻击与防范、信息隐藏理论与技术、物联网安全、网络对抗" ]
网络出版日期:2020-09,
纸质出版日期:2020-09-25
移动端阅览
王佳琪, 鲁宁, 程庆丰, 等. 面向隐私保护的多属性逆向频谱拍卖方案[J]. 通信学报, 2020,41(9):77-91.
Jiaqi WANG, Ning LU, Qingfeng CHENG, et al. Privacy-preserving multi-attribute reverse spectrum auction scheme[J]. Journal on communications, 2020, 41(9): 77-91.
王佳琪, 鲁宁, 程庆丰, 等. 面向隐私保护的多属性逆向频谱拍卖方案[J]. 通信学报, 2020,41(9):77-91. DOI: 10.11959/j.issn.1000-436x.2020121.
Jiaqi WANG, Ning LU, Qingfeng CHENG, et al. Privacy-preserving multi-attribute reverse spectrum auction scheme[J]. Journal on communications, 2020, 41(9): 77-91. DOI: 10.11959/j.issn.1000-436x.2020121.
针对现有的逆向频谱拍卖没有考虑与频谱有关的非价格属性的问题和频谱拍卖安全问题,提出了一个面向隐私保护的多属性逆向频谱拍卖方案。首先,将含有频谱价格、与频谱有关的非价格正向属性值作为频谱竞标人的竞标方案并执行拍卖判断频谱赢家。其次,为确保频谱拍卖的安全性,方案利用 Paillier 门限机制引入一组拍卖人的分治集中式频谱拍卖服务器代替传统单一的第三方代理机构,防止频谱拍卖人与频谱竞标人的“合作欺诈”。所提方案还引入匿名化技术、不经意传输技术的密码学工具,确保频谱拍卖的安全特性,使频谱拍卖安全地执行。对所提方案的安全协议进行安全分析表明,协议具有较强的安全性。对协议进行性能评估,实验结果表明,所提方案在计算开销上优于可应用在频谱拍卖场景下的多属性逆向拍卖安全方案。
Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction
a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly
price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly
to ensure the security of the spectrum auction
the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency
which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features
which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated
and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.
AL-KINANI A , WANG C X , ZHOU L , et al . Optical wireless communication channel measurements and models [J ] . IEEE Communications Surveys & Tutorials , 2018 , 20 ( 3 ): 1939 - 1962 .
CHOWDHURY M Z , HASAN M K , SHAHJALAL M , et al . Opportunities of optical spectrum for future wireless communications [C ] // 2019 International Conference on Artificial Intelligence in Information and Communication . Piscataway:IEEE Press , 2019 : 4 - 7 .
ZHAO F , TANG Q . A KNN learning algorithm for collusion-resistant spectrum auction in small cell networks [J ] . IEEE Access , 2018 , 6 : 45796 - 45803 .
YADAV I , KULKARNI A A , KARANDIKAR A . Strategy-proof spectrum allocation among multiple operators [C ] // 2019 IEEE Wireless Communications and Networking Conference . Piscataway:IEEE Press , 2019 : 1 - 6 .
万屹 . 全球首次频谱资源激励拍卖带给我们的启示 [J ] . 中国无线电 , 2017 ( 11 ): 37 - 38 .
WAN Y . Enlightenment from the world’s first spectrum resource incentive auction [J ] . China Radio , 2017 ( 11 ): 37 - 38 .
余莉娟 . 激励拍卖:利用市场手段加速频谱转让的新手段 [J ] . 世界电信 , 2015 ( 12 ): 50 - 53 .
YU L J . Incentive auction:new means to use market to accelerate spectrum transfers [J ] . World Telecommunications , 2015 ( 12 ): 50 - 53 .
TEICH J E , WALLENIUS H , WALLENIUS J , et al . A multi-attribute e-auction mechanism for procurement:Theoretical foundations [J ] . European Journal of Operational Research , 2006 , 175 ( 1 ): 90 - 100 .
GOLDREICH O . On the foundations of cryptography [M ] . NewYork : ACM BooksPress , 2019 : 411 - 496 .
BRICKELL J , SHMATIKOV V . Privacy-preserving graph algorithms in the semi-honest model [C ] // International Conference on the Theory and Application of Cryptology and Information Security . Berlin:Springer , 2005 : 236 - 252 .
FOUQUE P A , POUPARD G , STERN J . Sharing decryption in the context of voting or lotteries [C ] // International Conference on Financial Cryptography . Berlin:Springer , 2000 : 90 - 104 .
PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 1999 : 223 - 238 .
SHOUP V , . Practical threshold signatures [C ] // International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2000 : 207 - 220 .
BEIL D R , WEIN L M . An inverse-optimization-based auction mechanism to support a multiattribute RFQ process [J ] . Management Science , 2003 , 49 ( 11 ): 1529 - 1545 .
SCHARTNER P , SCHAFFER M . Unique user-generated digital pseudonyms [C ] // International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security . Berlin:Springer , 2005 : 194 - 205 .
TZENG W G . Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters [J ] . IEEE Transactions on Computers , 2004 , 53 ( 2 ): 232 - 240 .
BAUDRON O , FOUQUE P A , POINTCHEVAL D , et al . Practical multi-candidate election system [C ] // Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing . New York:ACM Press , 2001 : 274 - 283 .
DAMGÅRD I , JURIK M . A generalisation,a simplication and some applications of paillier’s probabilistic public-key system [C ] // International Workshop on Public Key Cryptography . Berlin:Springer , 2001 : 119 - 136 .
FIAT A , SHAMIR A . How to prove yourself:practical solutions to identification and signature problems [C ] // Conference on the Theory and Application of Cryptographic Techniques . Berlin:Springer , 1986 : 186 - 194 .
PAN M , SUN J , FANG Y . Purging the back-room dealing:secure spectrum auction leveraging paillier cryptosystem [J ] . IEEE Journal on Selected Areas in Communications , 2011 , 29 ( 4 ): 866 - 876 .
HUANG Q , TAO Y , WU F . Spring:a strategy-proof and privacy preserving spectrum auction mechanism [C ] // 2013 Proceedings IEEE INFOCOM . Piscataway:IEEE Press , 2013 : 827 - 835 .
WU F , HUANG Q , TAO Y , et al . Towards privacy preservation in strategy-proof spectrum auction mechanisms for noncooperative wireless networks [J ] . IEEE/ACM Transactions on Networking , 2014 , 23 ( 4 ): 1271 - 1285 .
HUANG H , LI X Y , SUN Y , et al . PPS:privacy-preserving strategyproof social-efficient spectrum auction mechanisms [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 26 ( 5 ): 1393 - 1404 .
CHEN Z , CHEN L , HUANG L , et al . Towards secure spectrum auction:both bids and bidder locations matter:poster [C ] // Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing . New York:ACM Press , 2016 : 361 - 362 .
SRINATH T R , SINGH M P , PAIS A R . Anonymity and verifiability in multi-attribute reverse auction [J ] . arXiv Preprint,arXiv:1109.0359 , 2011
SRINATH T R , KELLA S , JENAMANI M , et al . A new secure protocol for multi-attribute multi-round e-reverse auction using online trusted third party [C ] // International Conference on Emerging Applications of Information Technology . Piscataway:IEEE Press , 2011 : 149 - 152 .
NJAH H , JAMOUSSI S , MAHDI W . Deep Bayesian network architecture for big data mining [J ] . Concurrency and Computation:Practice and Experience , 2019 , 31 ( 2 ):e4418.
WANG J , KARUPPIAH M , KUMARI S , et al . A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification [J ] . Journal of Intelligent & Fuzzy Systems , 2019 ,doi:10.3233/JIFS-169979.
WANG S G , XU P , XU X H , et al . TODA:truthful online double auction for spectrum allocation in wireless networks [C ] // 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum . Piscataway:IEEE Press , 2010 : 1 - 10 .
CHEN Z , HUANG L , LI L , et al . PS-TRUST:provably secure solution for truthful double spectrum auctions [C ] // IEEE INFOCOM 2014-IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2014 : 1249 - 1257 .
CHEN Z , WEI X , ZHONG H , et al . Secure,efficient and practical double spectrum auction [C ] // 2017 IEEE/ACM 25th International Symposium on Quality of Service . Piscataway:IEEE Press , 2017 : 1 - 6 .
WANG Q , HUANG J , CHEN Y , et al . $ PROST $:privacy-preserving and truthful online double auction for spectrum allocation [J ] . IEEE Transactions on Information Forensics and Security , 2018 , 14 ( 2 ): 374 - 386 .
PAN M , ZHU X , FANG Y . Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer [J ] . Wireless Networks , 2012 , 18 ( 2 ): 113 - 128 .
CHEN Y , TIAN X , WANG Q , et al . ARMOR:a secure combinatorial auction for heterogeneous spectrum [J ] . IEEE Transactions on Mobile Computing , 2019 , 18 ( 10 ): 2270 - 2284 .
0
浏览量
661
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构