Trusted coalition-proof protocol model based on secure multi-part computing
N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419969/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537772804898816 |
---|---|
author | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 |
author_facet | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 |
author_sort | CHENG Bai-liang1 |
collection | DOAJ |
description | N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party. |
format | Article |
id | doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f2025-01-14T08:22:30ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132233074419969Trusted coalition-proof protocol model based on secure multi-part computingCHENG Bai-liang1ZENG Guo-sun1JIE An-quan2N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.http://www.joconline.com.cn/zh/article/74419969/secure multi-parttrust computingcoalition-proofcorrelated equilibrium |
spellingShingle | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 Trusted coalition-proof protocol model based on secure multi-part computing Tongxin xuebao secure multi-part trust computing coalition-proof correlated equilibrium |
title | Trusted coalition-proof protocol model based on secure multi-part computing |
title_full | Trusted coalition-proof protocol model based on secure multi-part computing |
title_fullStr | Trusted coalition-proof protocol model based on secure multi-part computing |
title_full_unstemmed | Trusted coalition-proof protocol model based on secure multi-part computing |
title_short | Trusted coalition-proof protocol model based on secure multi-part computing |
title_sort | trusted coalition proof protocol model based on secure multi part computing |
topic | secure multi-part trust computing coalition-proof correlated equilibrium |
url | http://www.joconline.com.cn/zh/article/74419969/ |
work_keys_str_mv | AT chengbailiang1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing AT zengguosun1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing AT jieanquan2 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing |