Trusted coalition-proof protocol model based on secure multi-part computing
N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-pr...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2011-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74419969/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850090125008044032 |
|---|---|
| author | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 |
| author_facet | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 |
| author_sort | CHENG Bai-liang1 |
| collection | DOAJ |
| description | N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party. |
| format | Article |
| id | doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f |
| institution | DOAJ |
| issn | 1000-436X |
| language | zho |
| publishDate | 2011-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-2f0b28cea6014a23ac4b2f3d8b925a8f2025-08-20T02:42:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-0132233074419969Trusted coalition-proof protocol model based on secure multi-part computingCHENG Bai-liang1ZENG Guo-sun1JIE An-quan2N parties were involved in the computation of a function,which did not trust each other.Some of them found a coalition and destroy the security of others through collusion.Based on secure multi-party computation and communica-tions channel,to the collusion that could be nested,a trusted coalition-proof protocol model was proposed.The concept of correlated equilibrium was used by the model in game theory for talking place the trusted third party.http://www.joconline.com.cn/zh/article/74419969/secure multi-parttrust computingcoalition-proofcorrelated equilibrium |
| spellingShingle | CHENG Bai-liang1 ZENG Guo-sun1 JIE An-quan2 Trusted coalition-proof protocol model based on secure multi-part computing Tongxin xuebao secure multi-part trust computing coalition-proof correlated equilibrium |
| title | Trusted coalition-proof protocol model based on secure multi-part computing |
| title_full | Trusted coalition-proof protocol model based on secure multi-part computing |
| title_fullStr | Trusted coalition-proof protocol model based on secure multi-part computing |
| title_full_unstemmed | Trusted coalition-proof protocol model based on secure multi-part computing |
| title_short | Trusted coalition-proof protocol model based on secure multi-part computing |
| title_sort | trusted coalition proof protocol model based on secure multi part computing |
| topic | secure multi-part trust computing coalition-proof correlated equilibrium |
| url | http://www.joconline.com.cn/zh/article/74419969/ |
| work_keys_str_mv | AT chengbailiang1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing AT zengguosun1 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing AT jieanquan2 trustedcoalitionproofprotocolmodelbasedonsecuremultipartcomputing |