Journal on CommunicationsVol. 40, Issue 7, Pages: 135-143(2019)
作者机构:
1. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
2. 贵州省公共大数据重点实验室,贵州 贵阳 550025
3. 贵州大学数学与统计学院,贵州 贵阳 550025
作者简介:
基金信息:
The National Natural Science Foundation of China(61772008);Topnotch Talent in Science and Technology Support Program of Guizhou Province Education Department([2016]060);The Science and Technology Major Support Program of Guizhou Province(20183001);Ministry of Educatio China Mobile Research Fund Project(MCM20170401);Guizhou Provincial Science and Technology Plan Project([2017]5788)
A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly
game theory was introduced into delegation computation and according to rational participants behavior preferences analysis
a rational delegate computing game model was designed.Secondly
according to the equilibrium demand of game model and the security requirement of rational delegation computation
a rational security model was established.Thirdly
combining Yao's garbled circuit with its advantages of re-randomization
as well as full homomorphic encryption technology
the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally
the security of the protocol and the privacy of the input and output were proved according to the rational security model
and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security
but also considers the behavioral preference of participants
which is more in line with the delegationcomputing mode under the big data environment.
关键词
Keywords
references
GOLDWASSER S , KALAI Y T , ROTHBLUM G N . Delegating computation:interactive proofs for muggles [C ] // ACM Symposium on Theory of Computing . ACM , 2008 : 113 - 122 .
GOLDWASSER S , MICALI S , RACKOFF C . The knowledge complexity of interactive proof systems [J ] . SIAM Journal on Computing , 1989 , 18 ( 1 ): 186 - 208 .
ARORA S , SAFRA S . Probabilistic checking of proofs:a new characterization of NP [J ] . Journal of the ACM , 1998 , 45 ( 1 ): 70 - 122 .
CHUNG K M , KALAI Y , VADHAN S . Advances in cryptology -CRYPTO 2010:improved delegation of computation using fully homomorphic encryption [M ] . Berlin : SpringerPress , 2010 : 483 - 501 .
GENTRY C . A fully homomorphic encryption scheme [M ] . Palo Alto : Stanford University PressPress , 2009 .
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts [C ] // USENIX Conference on Security . USENIX Association , 2011 : 34 - 34 .
YAO A C , . Protocols for secure computations [C ] // The Annual Symposium on Foundations of Computer Science . IEEE Computer Society , 1982 : 160 - 164
GENNARO R , GENTRY C , PARNO B . Advances in cryptology -CRYPTO 2010:non-interactive verifiable computing:outsourcing computation to untrusted workers [M ] . Berlin : SpringerPress , 2010 : 465 - 482 .
AZAR P D , MICALI S . Rational proofs [C ] // The Annual ACM Symposium on Theory of Computing . ACM , 2012 : 1017 - 1028 .
AZAR P D , MICALI S . Super-efficient rational proofs [C ] // Fourteenth ACM Conference on Electronic Commerce . ACM , 2013 : 29 - 30 .
GUO S , HUBÁČEK P ROSEN A , et al . Rational arguments:single round delegation with sublinear verification [C ] // Conference on Innovations in Theoretical Computer Science . ACM , 2014 : 523 - 540 .
TIAN Y L , PENG C G , LIN D D . Bayesian mechanism for rational secret sharing scheme [J ] . Science China Information Sciences , 2015 , 58 ( 5 ): 1 - 13 .
CHEN J , MCCAULEY S , SINGH S . Rational proofs with multiple provers [J ] . Information Processing Letters , 2015 , 114 ( 11 ): 237 - 248 .
KILIAN J , . A note on efficient zero-knowledge proofs and arguments [C ] // ACM Symposium on Theory of Computing . ACM , 1992 : 723 - 732 .
Quang Duy Lã , CHEW Y H , SOONG B H . An Introduction to Game Theory [M ] . Oxford : Oxford University PressPress , 2005 .
GENTRY C , . Fully homomorphic encryption using ideal lattices [C ] // The ACM Symposium on the Theory of Computing . ACM , 2009 : 169 - 178 .
GENTRY C , HALEVI S , VAIKUNTANATHAN V . I-hop homomorphic encryption and rerandomizable Yao circuits [C ] // The Annual Conference on Advances in Cryptology . IEEE Press , 2010 : 155 - 172 .