合谋的识别防范及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
为了避免合谋现象带来的危害,针对电力市场和P2P网络中的合谋问题进行了分析和研究。分析了电力市场中合谋竞标形成因素并设计实现了基于模糊综合评判和聚类分析的的综合判别算法。该算法将关联度、市场集中度、量价指数和合理性分析等多种分析方法引入到模糊综合评判中用来建立隶属函数,并采用层次分析法和变权法来配置和调整权重,结合聚类分析综合判定出合谋竞标的发电商,并通过算例验证了该算法的可行性和高效性;通过研究P2P网络信誉体制下的合谋问题,设计了一种P2P网络中满足防范合谋攻击的信誉体制并实现了该系统,指出王-李门限签名方案在P2P网络中防范合谋攻击的缺陷,给出了改进方案并验证其正确性。
The collusion of electricity market and P2P is analyzed and researched in order to avoid the injury of collusion in this paper. Based on the research of the basic factors of collusive bidding in electricity market, the power suppliers bid collusion integrated discriminant algorithm is designed and implemented, which bases on fuzzy comprehensive evaluation and cluster analysis. The algorithm introduces a variety of analysis methods into the fuzzy comprehensive evaluation to establish membership functions such as correlation degree, market concentration, capacity price index and soundness analysis. And it uses the method of AHP and variable weight to configure and adjust the weights, which combine with clustering algorithm to determine collusive bidding power supplier. At last the feasibility of the algorithm and high efficiency is proved through numerical results. By studying the collusion problem under the reputation system of P2P networks, a reputation system for P2P networks is designed and implemented, which can meet the prevention of collusion attacks. And by analyzing the deficiencies of the current P2P networks based on Wang-Li schemes against conspiracy attacks,an improved method of fight against collusion in the threshold is proposed and proved. Gao Xiaohu (Computer Application Technology)
引文
[1]徐楠,文福拴.电力市场中发电公司间心照不宣的勾结浅析.电力系统自动化,2005,29(8):10~15
    [2]刘继春.电力市场环境下发电公司竞价策略及市场力研究:[博士学位论文].成都:四川大学,2006
    [3] Friedman J.W. A non-cooperative equilibrium for supergames. Review of Economic Studies, 1971,38
    [4] Resnickand P., Zeckhauserand R., Friendman E., et al. Reputation systems . Communications of the ACM, 2000,43(12): 45~48
    [5] Fabra N.,Toro J.Price Wars and Collusion in the Spanish Electricity Market.International Journal of Industrial Organization,2005,23:155~181
    [6] Guan X., Ho Y.-C, and Pepyne D.L. Gaming and price spikes in electric power markets. IEEE Tans. Power Systems,2001,16(3):402~408
    [7] Emmanuel R., Macatangay A. Tacit Collusion in the Frequently Repeated Multi-unit Uniform Price Auction for Wholesale Electricity in England and Wales. European Journal of Law and Economics,2002,13(3):257~273
    [8] Hos S.A study of basic strategy in clearing pricing auction.In: Proceedings of the 1999 IEEE PES Power Industry Computer Applications Conference (PICA' 99) .Santa Clara:1999.55~60
    [9]张宇波,罗先觉,薛钧义.非完全信息下电力市场中电厂机组竞价上网的博弈解.电力系统及其自动化学报,2003,15(1):27~32
    [10] Cau T.D.H.,Anderson E.J. A Co-evolutionary Approach to Modeling the Behavior of Participants in Competitive Electricity Markets. In: Proceedings of 2002 IEEE Power Engineering Society Summer Meeting. Chicago(USA):2002.1534~1540
    [11] Cau T.D.H.,Anderson E.J. A Co-evolutionary Approach to the Tacit Collusion of Generators in Oligopolistic Electricity Markets: Pricewise Linear Bidding Structure Case. In: Proceedings of the 2003 Congress on Evolutionary Computation(CEC).Canberra(Australia): 2003.2306~2313
    [12]叶泽.电力市场中企业合谋的原因.长沙理工大学学报(社会科学版),2005,20(1):47~50
    [13]姚智斌.发电市场中的合谋与规制.江苏电机工程,2005,24(6):61~64
    [14]任震,朱然,黄雯莹.发电商之间的串通竞标分析及基于模糊理论判定.电力自动化设备,2004,24(10):7~10
    [15]肖兴辉.电力市场发电商合谋竞标的判定与防范:[硕士学位论文].北京:华北电力大学,2006
    [16]王永干.中国电力前沿问题探讨.北京:中国科学技术出版社出版,2004,350~358
    [17]游钰.论价格卡特尔的界定.法学评论,2001,(4):43~50
    [18]王珺珺,谢贤亚,李晓刚,等.简易当量电价法的解析表达及发电厂商古诺博弈行为初探.电力自动化设备,2003,23(1):61~64
    [19] Michael Kinateder, Siani Pearson. A Privacy-Enhanced Peer-to-Peer Reputation System. Springer-Verlag Berlin Heidelberg,2003.206~215
    [20] Pavlov E., Rosenschein J.S., Topol Z. Supporting Privacy in Decentralized Additive Reputation systems. ITrust 2004,LNCS 2995, Springer-Verlag Berlin Heidelberg,2004.108~119
    [21] Roger Dingledine, Nick Mathewson, and Paul Syverson. Reputation in Privacy Enhancing Technologies. Proceedings of the 12th annual conference on Computers,freedom and privacy,2002.1~6
    [22] Aameek Singh, Ling Liu.TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Proceedings of the Third International Conference on Peer-to-Peer Computing(P2P’03),2003. 142~149
    [23] Roslan Ismail, Colin Boyd, and Audun Josang. A Security Architecture for Reputation Systems. EC-Web 2003,LNCS 2738,Springer-Vrlag Berlin,2003.176~185
    [24]赵恒.P2P网络中信誉体制的安全性研究:[硕士学位论文].西安:西安电子科技大学,2005
    [25] Gan Yuan-ju. Verifiable threshold signature schemes against conspiracy attack. Journal of Zhejiang University Science,2004,5(1):50~54
    [26] Xie Qi. Cryptanalysis and improvement of two threshold signature schemes. Journal on Communications,2005,26(7):123~128
    [27]胡迎松,徐鹏.基于Xie门限签名方案的缺陷分析与改进.小型微型计算机系统,2007,28(1):58~61
    [28]高峰,李丽娟,乐光学,等.门限DSA签名方案在P2P网络中的应用研究.计算机工程与应用,2007,43(9):117~120
    [29]杜松怀,温步壕,蒋传文.电力市场.北京:中国电力出版社,2004,34~53
    [30]亚洲开发银行与原国务院经济体制改革办公室课题组.中国电力监管机构建设研究报告.北京:中国财经出版社,2004,3~4
    [31] Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, et al. Peer-to-Peer Computing. HP Laboratories Palo Alto, July 3rd,2003
    [32] Rudiger Schollmeier.A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications, In:Proceedings of the First International Conference on Peer-to-Peer Computing(P2P’01),2001.101~102
    [33] P2P history,available:http://www.mac-P2P.com/P2P-history,June 1,2005
    [34] Fabra N.Tacit collusion in repeated auctions: uniform versus discriminatory. Journal of Industrial Economics,2003,51:271~293
    [35] Puller S.Pricing and Firm Conduct in California’s Deregulated Electricity Market.Review of Economics and Statistics,2007,89:75~87
    [36]陈建华.电力市场中发电商报价行为分析:[硕士学位论文].杭州:浙江大学,2004
    [37]王伟,管毅平,翟海青,等.电能现货拍卖交易中企业间默契合谋行为分析.电力系统自动化,2005,29(23):15~18
    [38]陈建华,周浩,韩祯祥,等.应用量价指数进行发电商报价分析.浙江大学学报工学版,2005,39(6):915~920
    [39]于秀林,任雪松.多元统计分析.北京:中国统计出版社,2005,84~85
    [40]单国栋,戴英侠,王航.P2P网络系统中的安全问题.通信技术,2002,5:81~84
    [41] Seluck A.A., Uzun E., Pariente M.R. A Reputation-Based Trust Management System for P2P Networks. Proceedings of 4th IEEE/ACM International Symposium on Cluster Computing and theGrid. Chicago, Illinois, 2004. 251~258
    [42] Zhou X., Bressan S., Tank L., et al. Efficient Distributed ReputationScheme for Peer-to-peer systems. HIS 2003, LNCS 2713. Berlin Heidelberg: Springer-V erlag, 2003,54~63
    [43] Katger D., Kaashoeky I, Stoica R, et al. Chord: A Scalable Peer-to-Peer Lookupservice for Internet Applications. Proceedings of the 2001 ACM SIGCOMM Conference,2001.149~160
    [44] Lit Y.Time Constraint Delegation for P2P Data Decryption.Computer Science, LNCS 2802. Berlin: Springer-Verlag,2004.173~186
    [45] Cornelli F. Choosing reputable servents in a P2P network. In: Lassner D, eds. In Proceedings of the 11th International World Wide Web Conference Hawaii,2002.441~449
    [46]王斌,李建华.无可信中心的(t,n)门限签名方案.计算机学报,2003,26(11):1581~1584
    [47]赵建杰.可验证秘密共享研究:[硕士学位论文].西安:陕西师范大学,2007
    [48]郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析.计算机学报,2006,29(11):2013~2016
    [49]徐秋亮,陈泽雄.对一个“抗合谋攻击的门限签名方案”的攻击.小型微型计算机系统,2005,26(12):2237~2239
    [50] Michels M., Horster P.On the Risk of Disruption in Several Multiparty Signatures Schemes.Proc. of Advances in Cryptology-ASIACRYPT’96. Berlin, Germany: Springer,1996.334~345

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700