Font Size: a A A

Research On Rational Security Multi-party Computing Protocol Based On Secret Sharing Under Various Mechanisms

Posted on:2019-12-25Degree:MasterType:Thesis
Country:ChinaCandidate:W ZhengFull Text:PDF
GTID:2428330593450518Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Within the network,we need strangers who do not know each other to perform some computation.Because everyone does not know and trust each other.This requires that these strange participants do not expose their input to other strangers in the course of calculation.Finally,we can obtain the result of the calculation.This process is called Secure Multi-Party Computation.There are many such situations in our actual life,such as the voting system and online auctions.As the use of Secure Multi-Party Computation is becoming more and more common in real life,scholars from all over the world have conducted detailed discussions and research on the field of Secure Multi-Party Computation.In order to solve the problem of fairness and make participants more realistic in Secure Multi-Party Computation,some scholars have focused on Game Theory in economics.2004,Teague and Halpern merged Game Theory with Secure Multi-Party Computation for the first time.In the later research,scholars designed the reputation mechanism and punishment mechanism to make the secure multi-party computation protocol more perfect.However,there are still some problems in the existing protocols,so it is worth studying and discussing how to rationally design these measures so that the rational participants can strictly abide by the agreement.In this paper,based on the existing secure multiparty computing protocol,the corresponding solutions are designed by analyzing the existing problems.The main contents are as follows:(1)A rational secret sharing protocol using false shadow dots is designed.The problems in the existing secret sharing protocol are analyzed.In order to solve these problems,the check parameter is desinged in this paper.In the secret sharing stage,the true shadow dots and false shadow dots are mixed together.And the agreement is analyzed from several aspects including feasibility,security,verifiability and efficiency.(2)A rational secure multi-party computation protocol based on reputation system is designed.Through discussion and analysis,the basic conditions that a perfect reputation system are given.This paper studies the value of reputation what is the core of reputation system and the principle of change that value of reputation should be followed.In accordance with this principle,a specific scheme for changing the value of reputation is designed.Combined with this scheme,using the secret sharing protocol in(1)to design a rational secure multi-party computing protocol.(3)A rational secure multi-party computing protocol based on punishment mechanism is designed.By introducing trust queue and malicious queue at the phase of secret sharing,the protocol can achieve the best fairness by using the different punishment mechanism which are different from the previous protocols.On the basis of this protocol,a rational and secure multiparty computing protocol is designed to compare the input values of participants from two angles of synchronous and asynchronous channels.Compared with the traditional millionaires' protocol,the protocol has better efficiency and is more convenient in real life.
Keywords/Search Tags:Game theory, Secret sharing, Secure multi-party computation, Reputation mechanism, Punishment mechanism
PDF Full Text Request
Related items