Research on security multi-party computing based on game theory
In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530142891966464 |
---|---|
author | Xinglan ZHANG Wei ZHENG |
author_facet | Xinglan ZHANG Wei ZHENG |
author_sort | Xinglan ZHANG |
collection | DOAJ |
description | In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with the agreement,compliance with the agreement is the optimal strategy for the participant.At present,the problem of computational efficiency based on game theory is low,and the protocol greatly improves the computational efficiency by introducing a binary tree. |
format | Article |
id | doaj-art-852ac9c943e24740a577af475d39c3c4 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2018-01-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-852ac9c943e24740a577af475d39c3c42025-01-15T03:12:31ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-01-014525659552627Research on security multi-party computing based on game theoryXinglan ZHANGWei ZHENGIn the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with the agreement,compliance with the agreement is the optimal strategy for the participant.At present,the problem of computational efficiency based on game theory is low,and the protocol greatly improves the computational efficiency by introducing a binary tree.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010game theorymillionaire problemsecure multi-party computationbinary sort tree |
spellingShingle | Xinglan ZHANG Wei ZHENG Research on security multi-party computing based on game theory 网络与信息安全学报 game theory millionaire problem secure multi-party computation binary sort tree |
title | Research on security multi-party computing based on game theory |
title_full | Research on security multi-party computing based on game theory |
title_fullStr | Research on security multi-party computing based on game theory |
title_full_unstemmed | Research on security multi-party computing based on game theory |
title_short | Research on security multi-party computing based on game theory |
title_sort | research on security multi party computing based on game theory |
topic | game theory millionaire problem secure multi-party computation binary sort tree |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010 |
work_keys_str_mv | AT xinglanzhang researchonsecuritymultipartycomputingbasedongametheory AT weizheng researchonsecuritymultipartycomputingbasedongametheory |