Notice of Violation of IEEE Publication Principles: Secure Two-Party Computation in Social Cloud Based on Reputation

Yilei Wang,Chao Guo,Tao Li,Qiuliang Xu
DOI: https://doi.org/10.1109/waina.2015.9
2015-01-01
Abstract:Notice of Violation of IEEE Publication Principles "Secure Two-Party Computation in Social Cloud Based on Reputation" by Yilei Wang, Chao Guo, Tao Li, Qiuliang Xu in Proceedings of the 29th International Conference on Advanced Information Networking and Applications Workshop, March 2015, pp. 242-245 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE’s Publication Principles. This paper copied text and formulas from the paper cited below. The original text was modified and reused without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. Also, Qiuliang Xu did not agree to be listed as an author. "Socio-Rational Secret Sharing as a New Direction in Rational Cryptography" by Mehrdad Nojoumian, Douglas R. Stinson, in Decision and Game Theory for Security, Vol 7638—Lecture Notes in Computer Science, 2012, pp. 18-37 Parties are expected to be cooperative such that some tasks, e.g. Two-party computation in social cloud, become much easier. It is well known that reputation is an important property to promote cooperation among parties in game theory. Therefore, we consider the effect of reputation when parties interact in social cloud to find a new way realizing mutual cooperation. More specifically, parities in the social cloud are rational who value their reputation. Cooperation can boost their reputation, so they have incentives to cooperate with others such that they may get a higher utility. The basic idea of this paper is to add reputation deriving from social cloudas part of the utility. That is, we describe the architecture and interaction between two rational parties in the social cloud, where two parties receive their opponent's trust or reputation from the social cloud. The computation of trust and reputation is finished in the social cloud. Finally, we prove that given proper parameters in rational secure two-party computation (rational STPC), it is possible to complete the computation in just one round in the second stage of the protocol.
What problem does this paper attempt to address?