Fairness in Secure Computing Protocols Based on Incentives

Yilei Wang,Leisi Chen,Ho-fung Leung,Chengyu Hu,Beijing Chen
DOI: https://doi.org/10.1007/s00500-015-1974-0
IF: 3.732
2015-01-01
Soft Computing
Abstract:Cloud computing is based on utility and consumption of computer resources. To solve the security issues in cloud computing, secure computing protocols are often used. Recently, rational parties as a new kind of parties are proposed, who wish to maximize their utilities in secure computing protocols. The utility definitions in most previous rational secure computing protocols derive from prisoner's dilemma game (PD game). In two-party rational computing protocols, parties decide to send their shares according to their utilities. Recently, we revisit the incentives for rational parties in secure computing protocols and give new utility definitions according to them. We find that the new utility definition is not similar to PD game any more. We discuss two-party and multi-party cases, respectively, and prove that parties have incentives to send their share to others. Furthermore, we also prove that parties can maximize their utilities in both cases.
What problem does this paper attempt to address?