Indexed by:
Abstract:
To solve the question that players will deviate from secret sharing protocol for their own benefits, we apply game theory to the protocol. It is the first time to use the model of dynamic game of incomplete information, by controlling the probability parameter, the designated strategies will be a computational perfect k-resilient Nash equilibrium. Using this protocol, to achieve fairness, we don't have to assume the number of malicious players is no more than half of the total number which is important in traditional protocols, our protocol can prevent deviating behaviors effectively to achieve extreme fairness.
Keyword:
Reprint Author's Address:
Email:
Source :
CHINESE JOURNAL OF ELECTRONICS
ISSN: 1022-4653
Year: 2012
Issue: 1
Volume: 21
Page: 149-152
1 . 2 0 0
JCR@2022
ESI Discipline: ENGINEERING;
JCR Journal Grade:4
CAS Journal Grade:4
Cited Count:
WoS CC Cited Count: 5
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 0
Affiliated Colleges: