首页 | 本学科首页   官方微博 | 高级检索  
     

基于Swarm平台的理性密码协议建模与仿真
引用本文:杨雪君,;陈宁江.基于Swarm平台的理性密码协议建模与仿真[J].信息网络安全,2014(8):34-39.
作者姓名:杨雪君  ;陈宁江
作者单位:[1]广西壮族自治区电子信息产品监督检验所,广西南宁530031; [2]广西大学计算机与电子信息学院,广西南宁530004
基金项目:广西自然科学基金[2013GXNSFAA25303]、广西科学研究与技术开发计划[1348020-7]
摘    要:针对现实世界中理性密码协议的参与者博弈过程不易观察和预测的问题,文章在多智能主体的仿真平台Swarm上对理性密码协议中参与者的诚实策略和非诚实策略行为进行了建模和仿真。文章首先定义了主体的收益矩阵,进一步根据收益矩阵建立了参与者在整个博弈过程中的状态复制方程;然后求解出该方程的三个均衡点,即所有参与者分别采用诚实策略、非诚实策略和混合策略时的不同均衡点取值,根据这三个取值设计了协议执行过程中主体间的博弈算法;最后,文章在Swarm平台上定义了博弈主体所需要的各个对象。由于Swarm平台上的基本对象功能不能完全满足理性密码协议仿真的需要,文章改造了Swarm平台上部分主体对象功能,给出了改造的关键代码,对协议交互过程中的博弈行为进行了仿真。仿真的实验结果表明,Swarm仿真工具可以有效观察到参与者的理性选择过程;并通过调节博弈算法中的收益参数来达到预期效果,使博弈在较少的次数内达到博弈的稳定均衡,同时使得选择诚实策略的参与者占总人数的一半以上。文章提出在Swarm平台上进行理性密码协议仿真的方法,对使用计算方法研究理性密码协议具有一定的参考价值。

关 键 词:网络安全  理性密码协议  博弈实验  计算博弈论

Modeling and Simulation of Rational Cryptographic Protocols based on Swarm
Affiliation:YANG Xue-jun, CHEN Ning-jiang ( 1. Guangxi Institute of Electron Production Supervision and Inspection, Nanning Guangxi 530031, China; 2. School of Computer and Electron Information, Guangxi University, Nanning Cruangxi 530004, China)
Abstract:Aiming at the question of number of strategies were chosen by participants in real world when the rational cryptographic protocols running, a model and the algorithm of solving this problem is designed, which simulated the rational actions on the Swarm platform of intelligent agents. Firstly, payoff matrix was deifned in this article, and then, the state-copy formulation of participants is listed up;3 Nash Equilibrium values discovered by solving the formulation, i.e., the different value which all the participants were used to honest strategy, tactics and non honesty mixed strategy, and game algorithm is designed according to the different values; at last, each object is deifned in the main game needed on the Swarm, however, the basic object function can not fully meet rational cryptographic protocols on the Swarm, so the transformation of the Swarm platform part of the main object function given the key code transformation, the game of interaction in the whole swarm is implemented on the Swarm. As the result shows, rational participants will be dififcult to reach Nash Equilibrium through rounds of game when the pay off function is constant. However, by using incentives to encourage the proifts of honest participants, rational participants will be easy to Nash Equilibrium with less rounds of game, and the proportion of the honest participants is at least half the list. There are some reference values by using the algorithmic game theory that presents the methods which simulated on the Swarm platform for researching rational cryptographic protocols in this article.
Keywords:network security  rational cryptographic protocols  Swarm  algorithmic game theory
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号