浏览全部资源
扫码关注微信
1. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
2. 贵州大学省部共建公共大数据国家重点实验室(筹),贵州 贵阳 550025
3. 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
[ "田有亮(1982− ),男,贵州盘县人,博士,贵州大学教授,主要研究方向为博弈论、密码学与安全协议" ]
[ "蒋小霞(1997− ),女,贵州遵义人,贵州大学硕士生,主要研究方向为通用可组合安全、理性委托计算" ]
网络出版日期:2021-09,
纸质出版日期:2021-09-25
移动端阅览
田有亮, 蒋小霞. 通用可组合框架下的公平理性委托计算[J]. 通信学报, 2021,42(9):106-119.
Youliang TIAN, Xiaoxia JIANG. Fair and rational delegation of computation in the universally composable framework[J]. Journal on communications, 2021, 42(9): 106-119.
田有亮, 蒋小霞. 通用可组合框架下的公平理性委托计算[J]. 通信学报, 2021,42(9):106-119. DOI: 10.11959/j.issn.1000-436x.2021126.
Youliang TIAN, Xiaoxia JIANG. Fair and rational delegation of computation in the universally composable framework[J]. Journal on communications, 2021, 42(9): 106-119. DOI: 10.11959/j.issn.1000-436x.2021126.
为实现理性委托计算中的经济与信誉公平性,基于密码学的区块链模型提出了通用可组合(UC)框架下的公平理性委托计算方案。首先,结合直接信誉和间接信誉构建关于委托方与计算方的双向信誉激励模型。其次,基于博弈论构建具有完美信息的理性委托计算动态博弈模型,分析得到唯一子博弈纳什均衡。再次,根据理性委托计算场景中的可验证性安全需求、参与者理性决策需求、经济与信誉公平需求以及敌手模型,基于通用可组合理论提出公平理性委托计算理想函数。最后,结合简洁承诺证明和智能合约提出了可安全实现理想函数的公平理性委托计算协议。协议分析证明,所提协议满足UC安全性。
To realize the economic and reputation fairness in rational delegation of computation
a fair and rational delegation of computation scheme based on blockchain model of cryptography in the universally composable (UC) framework was proposed.Firstly
a bidirectional reputation incentive model between the delegator and the calculator was presented by combining direct reputation and indirect reputation.Secondly
a dynamic game model with perfect information for fair and rational delegation of computation was constructed based on game theory
and a unique sub-game Nash equilibrium was further obtained.In addition
by analyzing the requirements for verifiability
rational decision of players
economic and reputation fairness
as well as adversary model
the ideal functionality for fair and rational delegation of computation was proposed.Finally
a fair and rational delegation of computation protocol by combining succinct commit-and-prove and smart contract was proposed to securely realize the ideal functionality.The security analysis shows that the proposed protocol satisfies UC security.
GOLDWASSER S , KALAI Y T , ROTHBLUM G N . Delegating computation:interactive proofs for muggles [C ] // Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing . New York:ACM Press , 2008 : 113 - 122 .
GOLDWASSER S , MICALI S , RACKOFF C . The knowledge complexity of interactive proof systems [J ] . SIAM Journal on Computing , 1989 , 18 ( 1 ): 186 - 208 .
ARORA S , SAFRA S . Probabilistic checking of proofs:a new characterization of NP [J ] . Journal of the ACM , 1998 , 45 ( 1 ): 70 - 122 .
BITANSKY N , CANETTI R , CHIESA A , et al . From extractable collision resistance to succinct non-interactive arguments of knowledge,and back again [C ] // Innovations in Theoretical Computer Science Conference . New York:ACM Press , 2012 : 326 - 349 .
GENNARO R , GENTRY C , PARNO B , et al . Quadratic span programs and succinct NIZKs without PCPs [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2013 : 626 - 645 .
PARNO B , HOWELL J , GENTRY C , et al . Pinocchio:nearly practical verifiable computation [C ] // 2013 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2013 : 238 - 252 .
COSTELLO C , FOURNET C , HOWELL J , et al . Geppetto:versatile verifiable computation [C ] // 2015 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2015 : 253 - 270 .
BELENKIY M , CHASE M , ERWAY C C , et al . Incentivizing outsourced computation [C ] // Proceedings of the 3rd International Workshop on Economics of Networked Systems . New York:ACM Press , 2008 : 85 - 90 .
KUPCU A . Incentivized outsourced computation resistant to malicious contractors [J ] . IEEE Transactions on Dependable and Secure Computing , 2017 , 14 ( 6 ): 633 - 649 .
DONG C Y , WANG Y L , ALDWEESH A , et al . Betrayal,distrust,and rationality:smart counter-collusion contracts for verifiable cloud computing [C ] // Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2017 : 211 - 227 .
TIAN Y L , GUO J , WU Y L , et al . Towards attack and defense views of rational delegation of computation [J ] . IEEE Access , 2019 , 7 : 44037 - 44049 .
ZHANG Y , VAN D S M . Reputation-based incentive protocols in crowdsourcing applications [C ] // 2012 Proceedings IEEE INFOCOM . Piscataway:IEEE Press , 2012 : 2140 - 2148 .
MA X D , MA J F , LI H , et al . RTRC:a reputation-based incentive game model for trustworthy crowdsourcing service [J ] . China Communications , 2016 , 13 ( 12 ): 199 - 215 .
JIANG X X , TIAN Y L . Rational delegation of computation based on reputation and contract theory in the UC framework [C ] // International Conference on Security and Privacy in Digital Economy . Berlin:Springer , 2020 : 322 - 335 .
CANETTI R , . Universally composable security:a new paradigm for cryptographic protocols [C ] // Proceedings 42nd IEEE Symposium on Foundations of Computer Science . Piscataway:IEEE Press , 2001 : 136 - 145 .
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [R ] .(2008-10-31)[2021-01-04 ] .
李沓 , 田有亮 , 向康 , 等 . 委托计算下基于区块链的公平支付方案 [J ] . 通信学报 , 2020 , 41 ( 3 ): 80 - 90 .
LI T , TIAN Y L , XIANG K , et al . Block-based fair payment scheme under delegation computation [J ] . Journal on Communications , 2020 , 41 ( 3 ): 80 - 90 .
尹鑫 , 田有亮 , 王海龙 . 公平理性委托计算协议 [J ] . 软件学报 , 2018 , 29 ( 7 ): 1953 - 1962 .
YIN X , TIAN Y L , WANG H L . Fair and rational delegation computation protocol [J ] . Journal of Software , 2018 , 29 ( 7 ): 1953 - 1962 .
ZHANG Y H , DENG R H , LIU X M , et al . Blockchain based efficient and robust fair payment for outsourcing services in cloud computing [J ] . Information Sciences , 2018 , 462 : 262 - 277 .
KOSBA A , MILLER A , SHI E , et al . Hawk:the blockchain model of cryptography and privacy-preserving smart contracts [C ] // 2016 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2016 : 839 - 858 .
JUELS A , KOSBA A , SHI E . The ring of gyges:investigating the future of criminal smart contracts [C ] // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2016 : 283 - 295 .
DORSALA M R , SASTRY V N , CHAPRAM S . Fair payments for verifiable cloud services using smart contracts [J ] . Computers & Security , 2020 , 90 : 101712 .
张维迎 . 博弈论与信息经济学 [M ] . 上海 : 格致出版社 , 2012 .
ZHANG W Y . Game theory and information economics [M ] . Shanghai : Gezhi Press , 2012 .
DELMOLINO K , ARNETT M , KOSBA A , et al . Step by step towards creating a safe smart contract:lessons and insights from a cryptocurrency lab [C ] // 2016 International Conference on Financial Cryptoraphy and Data Security . Berlin:Springer , 2016 : 79 - 94 .
HUANG K L , KANHERE S S , HU W . On the need for a reputation system in mobile phone based sensing [J ] . Ad Hoc Networks , 2014 , 12 : 130 - 149 .
KENNEY J F , KEEPING E S . Mathematics of statistics-part one [M ] . New York : D.van Nostrand , 1954 .
XIONG L , LIU L . PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J ] . IEEE Transactions on Knowledge and Data Engineering , 2004 , 16 ( 7 ): 843 - 857 .
KANG J W , XIONG Z H , NIYATO D , et al . Incentive mechanism for reliable federated learning:a joint optimization approach to combining reputation and contract theory [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 6 ): 10700 - 10714 .
0
浏览量
583
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构