Trusted coalition-proof protocol model based on secure multi-part computing

N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...

Full description

Saved in:
Bibliographic Details
Main Authors: CHENG Bai-liang1, ZENG Guo-sun1, JIE An-quan2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419969/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537772804898816
author CHENG Bai-liang1
ZENG Guo-sun1
JIE An-quan2
author_facet CHENG Bai-liang1
ZENG Guo-sun1
JIE An-quan2
author_sort CHENG Bai-liang1
collection DOAJ
description N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.
format Article
id doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f2025-01-14T08:22:30ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132233074419969Trusted coalition-proof protocol model based on secure multi-part computingCHENG Bai-liang1ZENG Guo-sun1JIE An-quan2N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.http://www.joconline.com.cn/zh/article/74419969/secure multi-parttrust computingcoalition-proofcorrelated equilibrium
spellingShingle CHENG Bai-liang1
ZENG Guo-sun1
JIE An-quan2
Trusted coalition-proof protocol model based on secure multi-part computing
Tongxin xuebao
secure multi-part
trust computing
coalition-proof
correlated equilibrium
title Trusted coalition-proof protocol model based on secure multi-part computing
title_full Trusted coalition-proof protocol model based on secure multi-part computing
title_fullStr Trusted coalition-proof protocol model based on secure multi-part computing
title_full_unstemmed Trusted coalition-proof protocol model based on secure multi-part computing
title_short Trusted coalition-proof protocol model based on secure multi-part computing
title_sort trusted coalition proof protocol model based on secure multi part computing
topic secure multi-part
trust computing
coalition-proof
correlated equilibrium
url http://www.joconline.com.cn/zh/article/74419969/
work_keys_str_mv AT chengbailiang1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing
AT zengguosun1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing
AT jieanquan2 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing