用户名: 密码: 验证码:
基于全同态加密的理性委托计算协议
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Rational Delegation Computation Protocol Based on Fully Homomorphic Encryption
  • 作者:李秋贤 ; 田有亮 ; 王缵
  • 英文作者:LI Qiu-xian;TIAN You-liang;WANG Zuan;College of Computer Science and Technology,Guizhou University;National Key Laboratory of Public Big Data;
  • 关键词:理性委托计算 ; 博弈论 ; 效用函数 ; 帕累托最优 ; 全同态加密
  • 英文关键词:rational delegation computation;;game theory;;utility function;;Pareto optimality;;fully homomorphic encryption
  • 中文刊名:DZXU
  • 英文刊名:Acta Electronica Sinica
  • 机构:贵州大学计算机科学与技术学院;公共大数据国家重点实验室;
  • 出版日期:2019-02-15
  • 出版单位:电子学报
  • 年:2019
  • 期:v.47;No.432
  • 基金:国家自然科学基金(No.61772008);; 贵州省教育厅科拔尖人才支持项目(黔教合KY字[2016]060);; 贵州省科技重大专项计划(No.20183001);; 贵州省科技计划项目(黔科合平台人才[2017]5788号);; 教育部—中国移动科研基金研发(No.MCM20170401);; 贵州大学培育项目(黔科合平台人才[2017]5788)
  • 语种:中文;
  • 页:DZXU201902030
  • 页数:5
  • CN:02
  • ISSN:11-2087/TN
  • 分类号:216-220
摘要
传统委托计算因需验证方验证其计算结果,从而导致协议效率低下.针对此问题,本文结合博弈委托代理理论和全同态加密技术,提出理性委托计算协议.该协议通过参与者之间的效用函数保证计算结果的正确性,无需验证方进行验证.首先,利用博弈委托代理理论,构造委托计算博弈模型;其次,结合全同态加密技术,构造理性委托计算协议;最后,对协议进行实验与分析,结果表明,该协议不但保证了安全性和正确性,并且全局可达帕累托最优.
        The traditional delegation computation require the verification party to verify the results,which leads to low efficiency of computation protocol. To solve this problem, this paper combines the game principal-agent theory and the fully homomorphic encryption technology to propose a rational delegation computation protocol. This protocol guarantees the correctness of the results through the utility function between the participants,without the validation of the prover. Firstly,we use the game principal-agent theory to construct a game model. Secondly,we combine the fully homomorphic encryption technology to construct the rational delegation computation protocol. Finally,we test and analyze the protocol, the results show that this protocol not only guarantees the safety and validity, and can achieve global Pareto optimality.
引文
[1]Goldwasser S,Kalai Y T,Rothblum G N. Delegating com-putation:Interactive proofs for M uggles[A]. ACM Sympo-sium on Theory of Computing[C]. Victoria,British Co-lumbia,Canada,DBLP,2008. 113-122.
    [2] Goldwasser S,Micali S,Rackoff C. The knowledge com-plexity of interactive proof systems[J]. SIAM Journal onComputing,1989,18(1):186-208.
    [3] Kalai Y T,Raz R. Probabilistically Checkable Arguments[M]. Advances in Cryptology-CRYPTO 2009. Berlin Hei-delberg:Springer,2009. 143-159.
    [4] Gentry,Craig. Fully homomorphic encryption using ideallattices[J]. Stoc,2009,9(4):169-178.
    [5] Gennaro R,Wichs D. Fully Homomorphic Message Au-thenticators[M]. Advances in Cryptology-ASIACRYPT2013. Berlin Heidelberg:Springer,2013. 301-320.
    [6] Gennaro R,Gentry C,Parno B. Non-interactive VerifiableComputing:Outsourcing Computation to Untrusted Work-ers[M]. Advances in Cryptology-CRYPTO 2010. BerlinHeidelberg:Springer,2010. 465-482.
    [7]Chung K M,Kalai Y,Vadhan S. Improved Delegation ofComputation Using Fully Homomorphic Encryption[M].Advances in Cryptology-CRYPTO 2010. Berlin Heidel-berg:Springer,2010. 483-501.
    [8]田有亮,马建峰,彭长根,等.秘密共享体制的博弈论分析[J].电子学报,2011,39(12):2790-2795.TIAN Y L,M A J F,PENG C G,et al. Game-theoretic anal-ysis for the secret sharing scheme[J]. Acta ElectronicaSinica,2011,39(12):2790-2795.
    [9]田有亮,李秋贤.理性密码协议研究进展[J].贵州大学学报:自然科学版,2018,(3):14-23.TIAN Y L,LI Q X. Research progress on rational cryptog-raphy protocol[J]. Journal of Guizhou University:NaturalScience Edition,2018,(3):14-23.
    [10]Xiao L,Chen Y,Lin W S,et al. Indirectreciprocity securi-ty game for large-scale w ireless netw orks[J]. IEEETransactions on Information Forensics&Security,2012,7(4):1368-1380.
    [11]Xiao L,Chen T,Liu J,et al. Anti-jamming transmissionstackelberg game w ith observation errors[J]. IEEE Com-munications Letters,2015,19(6):949-952.
    [12] Wang Y,Wu Q,Wong D S,et al. Securely OutsourcingExponentiations w ith Single Untrusted Program for CloudStorage[M]. Computer Security-ESORICS 2014. Spring-er International Publishing,2014. 326-343.
    [13] Chen X,Li J,Susilo W. Efficient fair conditional pay-ments for outsourcing computations[J]. IEEE Transac-tions on Information Forensics&Security,2012,7(6):1687-1694.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700