Calculation method of rational two-party calculation model based on safety entropy criterion

A calculation method and a calculation model technology, applied in the field of information security, can solve the problem of high cost and achieve the effect of easy prediction

Pending Publication Date: 2021-01-15
GUIZHOU UNIV
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of ensuring protocol security by setting a very high utility function is often higher than the value of the protocol itself, and the protocol is only suitable for a single scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calculation method of rational two-party calculation model based on safety entropy criterion
  • Calculation method of rational two-party calculation model based on safety entropy criterion
  • Calculation method of rational two-party calculation model based on safety entropy criterion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described implementations are only some, not all, embodiments of the present invention. Based on the implementation methods in the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0018] Embodiment of the present invention: the calculation method of the rational two-party calculation model based on the security entropy criterion, such as figure 1 As shown in the game tree model figure of the present invention, the rational security two-party calculation method based on the security entropy criterion according to the specific example of the present invention comprises the following steps:

[0019] S1, set the security entropy value δ according to the model, the participant P 1 ,P 2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a calculation method of a rational two-party calculation model based on a security entropy criterion, and provides a security two-party calculation protocol based on the entropy criterion, and the protocol can set corresponding security entropy thresholds according to different scenes. The security entropy is adopted as a method for evaluating the security of the two parties in different scenes. In addition, the relationship between the security entropy and the utility function is further discussed, and the optimal utility function is selected within the security entropy threshold range. The model in the invention is more flexible and universal, and the safety state of the model is well predicted.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method based on using information theory to control a game theory model. Background technique [0002] Entropy has always played an important role in our lives. It can be used not only to estimate the disorder of the system, but also as a measure of information. In recent years, many scholars have conducted a lot of research on the combination of entropy and cryptography. In network attack and defense, rational exchange protocols, and cryptographic security design, scholars use entropy as a tool to evaluate the security status of the system, and some scholars even introduce entropy to ensure the fairness of the behavior of participants in the protocol. [0003] In the prior art, the invention patent (CN104796858A) of the University of Electronic Science and Technology of China discloses a location privacy protection method based on false location and geometry in location s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/18G06F30/20
CPCG06F17/18G06F30/20
Inventor 张馨予陈玉玲李涛
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products