首页 | 本学科首页   官方微博 | 高级检索  
     

基于全同态加密的理性委托计算协议
引用本文:李秋贤,田有亮,王缵. 基于全同态加密的理性委托计算协议[J]. 电子学报, 2019, 47(2): 470-474. DOI: 10.3969/j.issn.0372-2112.2019.02.030
作者姓名:李秋贤  田有亮  王缵
作者单位:贵州大学计算机科学与技术学院,贵州贵阳,550025;贵州大学计算机科学与技术学院,贵州贵阳550025;公共大数据国家重点实验室,贵州贵阳550025
基金项目:国家自然科学基金;贵州省教育厅科拔尖人才支持项目;贵州省科技重大专项;贵州省科技计划;教育部-中国移动科研基金;贵州大学培育项目
摘    要:传统委托计算因需验证方验证其计算结果,从而导致协议效率低下.针对此问题,本文结合博弈委托代理理论和全同态加密技术,提出理性委托计算协议.该协议通过参与者之间的效用函数保证计算结果的正确性,无需验证方进行验证.首先,利用博弈委托代理理论,构造委托计算博弈模型;其次,结合全同态加密技术,构造理性委托计算协议;最后,对协议进行实验与分析,结果表明,该协议不但保证了安全性和正确性,并且全局可达帕累托最优.

关 键 词:理性委托计算  博弈论  效用函数  帕累托最优  全同态加密
收稿时间:2017-12-13

Rational Delegation Computation Protocol Based on Fully Homomorphic Encryption
LI Qiu-xian,TIAN You-liang,WANG Zuan. Rational Delegation Computation Protocol Based on Fully Homomorphic Encryption[J]. Acta Electronica Sinica, 2019, 47(2): 470-474. DOI: 10.3969/j.issn.0372-2112.2019.02.030
Authors:LI Qiu-xian  TIAN You-liang  WANG Zuan
Affiliation:1. College of Computer Science and Technology, Guizhou University, Guiyang, Guizhou 550025, China;2. National Key Laboratory of Public Big Data, Guiyang, Guizhou 550025, China
Abstract:The traditional delegation computation require the verification party to verify the results,which leads to low efficiency of computation protocol.To solve this problem,this paper combines the game principal-agent theory and the fully homomorphic encryption technology to propose a rational delegation computation protocol.This protocol guarantees the correctness of the results through the utility function between the participants,without the validation of the prover.Firstly,we use the game principal-agent theory to construct a game model.Secondly,we combine the fully homomorphic encryption technology to construct the rational delegation computation protocol.Finally,we test and analyze the protocol,the results show that this protocol not only guarantees the safety and validity,and can achieve global Pareto optimality.
Keywords:rational delegation computation  game theory  utility function  Pareto optimality  fully homomorphic encryption  
本文献已被 万方数据 等数据库收录!
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号