Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fair rational secure two-party computing protocol

A secure two-party computing, rational technology, applied in the field of rational cryptography, can solve problems such as uncertainty, inconsistent with realistic scenarios, and inability to measure the amount of information

Pending Publication Date: 2021-12-03
GUIZHOU UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are many problems in the traditional secure multi-party computation: 1) The participants in the agreement are either honest, semi-honest or malicious, and the actual participants are in the best of their own interests, so it does not conform to the realistic scenario; 2) In traditional secure multi-party computing, one participant will choose to terminate the agreement after obtaining the secret, which will lead to the unfairness of the agreement; 3) In the process of implementing the agreement, rational participants choose strategies based on their own interests, which will lead to uncertainty
However, in the process of executing the agreement, the participants usually have multiple behavioral strategies. When using information entropy to measure the event, it is impossible to measure the positive or negative amount of information transmitted by the event.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fair rational secure two-party computing protocol
  • Fair rational secure two-party computing protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The technical solution of the present invention is clearly and completely described below. The present invention provides a fair, rational and secure two-party computing protocol, and the specific steps are as follows:

[0013] Step 1: Initialization of direction entropy

[0014] Step 1.1: In the initial stage of the protocol, it is assumed that each participant has an initial direction entropy H(dir), and the initial direction entropy is

[0015] Step 1.2: Assume that there is a trusted third party (TTP) who selects the secret S and divides it into n shares, and sends n shares of secrets to P i ∈P(i∈{1,2}).

[0016] Step 1.3: TTP will with as information x and respectively by P 1 and P 2 hold.

[0017] Step 1.4: P 1 and P 2 Exchange n shares with Last P 1 and P 2 Integrate n secrets respectively to form S.

[0018] Step 2: Information exchange based on direction entropy

[0019] Step 2.1: Participant P i ∈P(i∈{1,2}) (assumed to be P 1 ) selects a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention designs a fair rational and safe two-party calculation protocol, and aims to solve the problem of fairness in rational and safe two-party calculation. Compared with the traditional security multi-party calculation, the participants in the rational security two-party calculation are rational so as to achieve the self utility maximization selection strategy. The main idea of the method is that the uncertainty of the participant strategy is investigated, the participant strategy is quantified by using the orientation vector of the direction entropy, and the behavior strategy of the participant is evaluated from different dimensions. When the participant selects the cooperation strategy, the orientation vector of the direction entropy is positive, and the transmitted information is positive information. And when the participant selects a non-cooperation strategy, the orientation vector of the direction entropy is negative, and the transmitted information is negative information. And finally, a conclusion is obtained that the direction entropy value of the participant selecting the cooperation strategy is higher than the direction entropy value of the participant selecting the non-cooperation strategy.

Description

Technical field: [0001] The invention belongs to the field of rational cryptography, and designs a fair, rational and secure two-party computing protocol in combination with secure multi-party computing and based on game theory. Background technique: [0002] There are many problems in the traditional secure multi-party computation: 1) The participants in the agreement are either honest, semi-honest or malicious. In reality, the participants have the greatest self-interest, so it does not conform to the realistic scenario; 2) In traditional secure multi-party computing, one participant will choose to terminate the agreement after obtaining the secret, which leads to the unfairness of the agreement; 3) In the process of implementing the agreement, rational participants make strategic choices based on their own interests, which will lead to uncertainty. [0003] Rational secure multi-party computation refers to secure multi-party computation with rational participants. It is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 马娟陈玉玲陈秀波徐刚钱晓斌
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products