Research on security multi-party computing based on game theory

In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with...

Full description

Saved in:
Bibliographic Details
Main Authors: Xinglan ZHANG, Wei ZHENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-01-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530142891966464
author Xinglan ZHANG
Wei ZHENG
author_facet Xinglan ZHANG
Wei ZHENG
author_sort Xinglan ZHANG
collection DOAJ
description In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with the agreement,compliance with the agreement is the optimal strategy for the participant.At present,the problem of computational efficiency based on game theory is low,and the protocol greatly improves the computational efficiency by introducing a binary tree.
format Article
id doaj-art-852ac9c943e24740a577af475d39c3c4
institution Kabale University
issn 2096-109X
language English
publishDate 2018-01-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-852ac9c943e24740a577af475d39c3c42025-01-15T03:12:31ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-01-014525659552627Research on security multi-party computing based on game theoryXinglan ZHANGWei ZHENGIn the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with the agreement,compliance with the agreement is the optimal strategy for the participant.At present,the problem of computational efficiency based on game theory is low,and the protocol greatly improves the computational efficiency by introducing a binary tree.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010game theorymillionaire problemsecure multi-party computationbinary sort tree
spellingShingle Xinglan ZHANG
Wei ZHENG
Research on security multi-party computing based on game theory
网络与信息安全学报
game theory
millionaire problem
secure multi-party computation
binary sort tree
title Research on security multi-party computing based on game theory
title_full Research on security multi-party computing based on game theory
title_fullStr Research on security multi-party computing based on game theory
title_full_unstemmed Research on security multi-party computing based on game theory
title_short Research on security multi-party computing based on game theory
title_sort research on security multi party computing based on game theory
topic game theory
millionaire problem
secure multi-party computation
binary sort tree
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010
work_keys_str_mv AT xinglanzhang researchonsecuritymultipartycomputingbasedongametheory
AT weizheng researchonsecuritymultipartycomputingbasedongametheory