Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information

被引:1
|
作者
Wang, Yilei [1 ,2 ]
Wong, Duncan S. [3 ]
Susilo, Willy [4 ]
Chen, Xiaofeng [5 ]
Xu, Qiuliang [6 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[5] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[6] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
game theory; Nash equilibrium; reputation; rational party; COOPERATION;
D O I
10.1002/sec.1292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fairness in secure two-party computation ensures that either both of the communicating parties learn the output of some pre-defined function or none of them does. Rational two-party computation is an extension of two-party computation that incorporates game theory into conventional two-party (cryptographic) computation protocols for achieving fairness. From the standpoint of game theory, the strategies are designed for achieving equilibrium resulting in attaining fairness in rational two-party computation protocols. Groce and Katz (Eurocrypt 2012) achieved fairness by computational Nash equilibrium under complete information. In this paper, protocols are considered in more practical scenarios of incomplete information, where fairness is achieved by sequential equilibrium. Our protocol has constant number of rounds as Groce and Katz do while achieving a stronger sequential equilibrium which also implies the computational Nash equilibrium. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3690 / 3700
页数:11
相关论文
共 50 条
  • [1] Fairness in the presence of semi-rational parties in rational two-party secure computation
    Sun, Zhonghong
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 103 - 109
  • [3] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    [J]. STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 413 - +
  • [4] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 157 - 176
  • [5] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    [J]. JOURNAL OF THE ACM, 2011, 58 (06)
  • [6] Partial Fairness in Secure Two-Party Computation
    S. Dov Gordon
    Jonathan Katz
    [J]. Journal of Cryptology, 2012, 25 : 14 - 40
  • [7] Partial Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Katz, Jonathan
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 14 - 40
  • [8] Rational secure two-party computation protocol
    Zhang, En
    Cai, Yongquan
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (07): : 1409 - 1417
  • [9] Secure Computation of Two-party Multisets with Rational Numbers
    Wang, Weiqiong
    Xie, Qiong
    Xu, Haojie
    Cui, Meng
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (05) : 1722 - 1730
  • [10] Rational Secure Two-party Computation in Social Cloud
    Wang, Yilei
    Liu, Zhe
    Li, Tao
    Xu, Qiuliang
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 476 - 483