Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Rational Secure Two-party Computation in Social Cloud

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 8792))

Included in the following conference series:

  • 2205Accesses

Abstract

Rational parties in secure two-party computation (STPC) are willing to maximize their utilities. However, they have no incentives to cooperate in STPC under correctness and exclusivity assumptions since cooperation will bring them inferior utilities. Consequently, both parties will not participate in STPC. Therefore, new methods must be introduced to make parties cooperate such that they can complete this computation task. In this paper, we redefine utility considering the notion of reputation derived from social cloud to promote cooperation. In social cloud, parties form their reputation when they interact with others. Parties will get a higher utility if they have a higher cooperative reputation. Therefore they have incentives to cooperate. The computation of reputation is completed in the social cloud, which reduce the computation work for parties. Furthermore, we prove that given proper parameters in rational STPC, it is possible to construct an efficient computation protocol, where only one exchanging round in the second stage of the hybrid protocol.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Asharov, G., Canetti, R., Hazay, C.: Towards a game theoretic view of secure computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 426–445. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. Journal of Cryptology 23(2), 281–343 (2010)

    Article MathSciNet MATH  Google Scholar 

  3. Beberg, A., Ensign, D., Jayachandran, G., Khaliq, S., Pande, V.: Folding@home: Lessons from eight years of volunteer distributed computing. In: Parallel Distributed Processing (IPDPS 2009), pp. 1–8. IEEE (2009)

    Google Scholar 

  4. Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143–202 (2000)

    Article MathSciNet MATH  Google Scholar 

  5. Chard, K., Caton, S.: Social cloud computing: A vision for socially motivated resource sharing. IEEE Transactions on Services Computing 5(4), 551–563 (2012)

    Article  Google Scholar 

  6. Cox, L., Noble, B.: Samsara: Honor among thieves in peer-to-peer storage. SIGOPS Operating Systems Rev. 37, 120–132 (2003)

    Article  Google Scholar 

  7. Garay, J., Katz, J., Maurer, U., Tackmann, B., Zikas, V.: Rational protocol design: Cryptography against incentive-driven adversaries. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), pp. 648–657. IEEE (2013)

    Google Scholar 

  8. Goldreich, O.: Foundations of Cryptography, vol. 2. Cambridge University Press (2004)

    Google Scholar 

  9. Gordon, S.: On fairness in secure computation. Ph.D. thesis, University of Maryland (2010)

    Google Scholar 

  10. Groce, A., Katz, J.: Fair computation with rational players. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 81–98. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Klimeck, G., McLennan, M., Brophy, S.P., Adams III, G.B., Lundstrom, M.S.: nanohub.org: Advancing education and research in nanotechnology. Computing in Science and Engineering 10, 17–23 (2008)

    Article  Google Scholar 

  12. Korpela, E., Werthimer, D., Anderson, D., Cobb, J., Leboisky, M.: Seti@home-massively distributed computing for seti. Computing in Science Engineering 3(1), 78–83 (2001)

    Article  Google Scholar 

  13. Lakshman, A., Malik, P.: Cassandra: Structured storage system on a p2p network. In: 28th ACM Symp. Principles of Distributed Computing (PODC 2009), p. 5. ACM, New York (2009)

    Chapter  Google Scholar 

  14. Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Systems Review 44(2), 35–40 (2010)

    Article  Google Scholar 

  15. Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180–197. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Marks, K.: Future of web apis: The social cloud, future of Web Apps (2008)

    Google Scholar 

  17. Ong, S.J., Parkes, D.C., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 36–53. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  18. OpenSocial and Gadgets Specification Group: Opensocial specification v0.9 (2009),http://www.opensocial.org/Technical-Resources/opensocial-spec-v09/OpenSocial-Specification.html

  19. Pezzi, R.: Information technology tools for a transition economy (2009),http://www.socialcloud.net/papers/ITtools.pdf

  20. Roure, D.D., Goble, C., Stevens, R.: The design and realisation of the myexperiment virtual research environment for social sharing of workflows. Future Generation Computer Systems 25(5), 561–567 (2012)

    Article  Google Scholar 

  21. Rowstron, A., Druschel, P.: Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility. SIGOPS Operating Systems Rev. 35, 188–201 (2001)

    Article  Google Scholar 

  22. Wang, Y., Liu, Z., Wang, H., Xu, Q.: Social rational secure multi-party computation. Concurrency and Computation: Practice and Experience 26(5), 1067–1083 (2014)

    Article  Google Scholar 

  23. Wang, Y., Liu, Z., Xu, Q.: New rational parties relying on reputation. Security and Communication Networks 7, 1128–1137 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. School of Information and Electrical Engineering, Ludong University, Middle of Hongqi Road 186, Yantai, 264025, Shandong, P.R. China

    Yilei Wang & Tao Li

  2. School of Computer Science and Technology, Shandong University, Shunhua Road 1500, Jinan, 250101, Shandong, P.R. China

    Yilei Wang & Qiuliang Xu

  3. Laboratory of Algorithmics, Cryptology and Security, University of Luxembourg, 6, rue Richard Coudenhove-Kalergi, L-1359, Luxembourg

    Zhe Liu

Authors
  1. Yilei Wang

    You can also search for this author inPubMed Google Scholar

  2. Zhe Liu

    You can also search for this author inPubMed Google Scholar

  3. Tao Li

    You can also search for this author inPubMed Google Scholar

  4. Qiuliang Xu

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department of Computing, Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong

    Man Ho Au

  2. Department of Computer Science and Communication, University of Insubria, Via Mazzini, 5, 21100, Varese, Italy

    Barbara Carminati

  3. Ming Hsieh Department of Electrical Engineering, University of Southern California, 3740 McClintock Avenue, EEB 100, 90089-2560, Los Angeles, CA, USA

    C.-C. Jay Kuo

Rights and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Wang, Y., Liu, Z., Li, T., Xu, Q. (2014). Rational Secure Two-party Computation in Social Cloud. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_36

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp