秘密交換的博弈模型及應(yīng)用研究
[Abstract]:With the rapid development of cloud computing and large-scale data technology, frequent data exchange and sharing among users make the distributed computing to be widely used, but due to the open and resource sharing of the platform under the distributed environment, The data exchange between users is faced with many security challenges, and the traditional secret exchange exposes some of the inherent defects due to the fact that the action motive of the participants is not taken into account, such as only finding fraud and not in advance. The establishment of game model for secret exchange belongs to the cross-research field of cryptography and game theory. It regards all the participants as rational, determines whether to comply with the protocol according to the utility function, and can better solve the security problem of the protocol. In this paper, the development status of the secret exchange is studied, the security and the existing problems of the existing rational secret exchange protocol are discussed. By analyzing the strategy and utility of the participants, the cooperative game model of the participants is established, the game model of the collusion game is resisted, and the game model is calculated on both sides. Finally, the game model is applied to the protocol design, and the utility function is controlled by the penalty strategy to encourage all the participants to abide by the agreement, so that the participants, while inclined to be the only person who is the only secret, are willing to choose to abide by the agreement for their own interests. The main research results of this paper are as follows: (1) A participant cooperation game model is built on the basis of the trigger strategy, aiming at the problem that only the participants can be cheated by the traditional secret sharing agreement and the behavior cannot be prevented. In the model, the participant income function and the penalty strategy are combined, so that the participants can only choose the cooperation if the deviation agreement will lead to the reduction of the gain function in the course of the execution, because the rational participant wants to get the final secret, only the cooperation can be selected, and the purpose of preventing and cheating is achieved. (2) The game model for preventing participants' collusion is constructed based on the reputation mechanism, aiming at the problem of the collusion of the participants in the secret sharing. In the model, the complicit motivation and behavior of the rational participant are analyzed in detail. By setting the parameter, the gain of the participant's collusion can only increase the negligible utility value, and the reputation mechanism is introduced to punish the participants departing from the agreement, so that the model can be used to calculate the anti-collusion equilibrium, The motivation of the rational participant to abide by the agreement is ensured. (3) In view of the fairness problem existing in the traditional security two-party computing agreement, a fair and two-party computing ideal world and a real world game model are constructed based on the incentive compatible mechanism. according to the definition of the fairness in the model, the ideal function and the rational safety two-party calculation protocol of the two-way calculation of the rational safety are given, and the strategy and utility function of the participants are set, so that the sending right data is the dominant strategy of the participants, It is ensured that both parties can obtain the results fairly, and finally, the ideal/ realistic paradigm is used to prove the safe and ideal function of the two-party calculation protocol of the rational safety, and the Nash equilibrium result of the protocol is analyzed. (4) the secret exchange game model is applied to the protocol, the rational secret sharing protocol with the cooperative motivation of the participants is designed, And the concept of the rational participant is applied to the threshold signature for the first time, the key distributor in the signing key distribution stage is unwilling to distribute the correct sub-key and the non-cooperative behavior of the participants in the signature synthesis stage, and a rational threshold signature protocol is proposed. taking the signature as a "rights" of the rational participant, and at the same time, taking the angle of the corresponding "RESPONSIBILITY", using the bargaining mechanism to solve the problem of the distribution of the rational signature key, and adopting a random uniform grouping method to construct a rational threshold signature synthesis mechanism, Ensures that each participant can obtain the correct sub-key, and simultaneously has the motivation to complete the signature of the message.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2016
【分類(lèi)號(hào)】:TP309
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 徐秋亮;陳澤雄;;對(duì)一個(gè)“抗合謀攻擊的門(mén)限簽名方案”的攻擊[J];小型微型計(jì)算機(jī)系統(tǒng);2005年12期
2 劉春林;王秀芳;郭紅林;孫正鳳;;一個(gè)可跟蹤的門(mén)限簽名方案的改進(jìn)[J];計(jì)算機(jī)與信息技術(shù);2006年07期
3 耿永軍;陳紅軍;崔國(guó)華;;一種可變門(mén)限值的門(mén)限簽名方案[J];武漢理工大學(xué)學(xué)報(bào);2007年05期
4 李慧賢;蔡皖東;龐遼軍;;一個(gè)安全的動(dòng)態(tài)門(mén)限簽名體制[J];計(jì)算機(jī)研究與發(fā)展;2007年09期
5 李艷;;門(mén)限簽名體制及其應(yīng)用[J];內(nèi)江科技;2007年12期
6 洪璇;陳克非;李強(qiáng);;通用可組合安全的門(mén)限簽名協(xié)議[J];通信學(xué)報(bào);2009年06期
7 沈忠華;賀奇夢(mèng);于秀源;;基于線性多項(xiàng)式的有向門(mén)限簽名方案[J];高校應(yīng)用數(shù)學(xué)學(xué)報(bào)A輯;2009年03期
8 秦華旺;戴躍偉;王執(zhí)銓;;一般訪問(wèn)結(jié)構(gòu)上的門(mén)限簽名方案[J];北京郵電大學(xué)學(xué)報(bào);2009年06期
9 y嚲Ь,
本文編號(hào):2503926
本文鏈接:http://www.sikaile.net/shoufeilunwen/xxkjbs/2503926.html