Font Size: a A A

Analysis And Design Of The Delegated Computation Protocol Based On Information Source Entropy And Game Equilibrium

Posted on:2021-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:J GuoFull Text:PDF
GTID:2428330611950430Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Delegated computing is an important technology in Mobile Internet to solve the problem of task authorization computing and the correctness of its results in the environment of big data and cloud computing.Rational delegation computing is the product of the integration of game theory and delegated computing.It extends the research of rational delegated computation.Introducing the delegation computing scheme of rational participants can guarantee the reliability of the calculation results through the utility function.This paper used information theory,game theory and delegated computing as tools to study the security attack and defense and the rational delegated computation scheme of rational delegated computation,mainly including security attack and defense problem of delegated computing,one-to-many rational delegated computing scheme based on mutual information,and rational delegated computing protocol using game equilibrium theory.The specific work is as follows:(1)From the views of attack and defense,this paper studies the security attack and defense problem of rational delegated computation.First,combining with the concept of average mutual information in information theory,it constructs the attack channel and defense channel of entrusting and computing respectively,and establishes the attack and defense model of rational delegated computation.Secondly,the relationship between the attack and defense limits of the client and the calculators under different mixed strategies is discussed.Finally,the experiment is analyzed to obtain the optimal strategy of the entrusting party and the calculating party when they reach the equilibrium point.(2)Rational delegated computing protocol based on threshold secret sharing.Firstly,combining with the average mutual information in the multi-user information theory,we present the attack and defense models of rational delegated computation,and construct the attack and defense channels of client and calculator.Secondly,based on the source coding theory,we constructed the attack and defense model and calculated the reachable capacity region of the defense channel,then conducted experimental simulation and analyzed and obtained the conclusion of attack and defense capability limitation.Then,we proposed a rational delegated computing protocol based on secret sharing and threshold encryption.Finally,the experimental analysis shows the correctness and security of the protocol.(3)Rational delegated computing protocol based on sequential equilibrium theory.Firstly,we analyzed the behavioral preferences and strategies of rational participants,and constructed the game model of delegated computing.Secondly,we designed a rational delegated computing protocol that satisfies sequential equilibrium.Finally,the analysis of the protocol shows that under this equilibrium strategy,in order to maximize their own interests,each participant must choose to effectively follow the honest strategy,which plays an important role in preventing collusion and cheat in the delegated computing,and guarantees the participants' fairness of the delegated computing.
Keywords/Search Tags:Rational Delegated Computation, Channel Capacity, Attack and Defense Capability Limitation, Threshold Secret Sharing, Sequential Equilibrium
PDF Full Text Request
Related items