Zhiyin Chen , Youliang Tian , Feng Zhou , Wei Xiong , Ze Yang , Shuai Wang
{"title":"多项式两方计算外包的合理可靠模型","authors":"Zhiyin Chen , Youliang Tian , Feng Zhou , Wei Xiong , Ze Yang , Shuai Wang","doi":"10.1016/j.compeleceng.2024.109829","DOIUrl":null,"url":null,"abstract":"<div><div>Outsourcing computation is a key technology for optimizing resource utilization and handling complex data tasks, especially when local resources are insufficient. However, service providers may trigger dishonest computation and data leakage due to selfishness, while clients may be reluctant to outsource computation due to high processing costs and malicious behaviour of servers. Addressing these issues, we propose a polynomial computation scheme based on game theory that achieves privacy computation and verifiability. Specifically, we formally construct a traditional two-party computation game model, analyse the benefits and motivations of the participants, and conclude that servers will generate selfish behaviours to break the protocol in order to maximize their benefits, resulting in damage to clients’ interests. Next, we propose a rational two-party polynomial computation protocol for efficient privacy computation between servers, and ensure the correctness of the computation based on a sampling verification technique and a deposit mechanism. Finally, game analysis proves that our scheme effectively constrains the selfish behaviour of service providers and conserves clients’ verification costs. Simulation experiments show that our scheme reduces the computation cost by more than 30% compared to other schemes.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109829"},"PeriodicalIF":4.0000,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A rational and reliable model for outsourcing polynomial two-party computation\",\"authors\":\"Zhiyin Chen , Youliang Tian , Feng Zhou , Wei Xiong , Ze Yang , Shuai Wang\",\"doi\":\"10.1016/j.compeleceng.2024.109829\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Outsourcing computation is a key technology for optimizing resource utilization and handling complex data tasks, especially when local resources are insufficient. However, service providers may trigger dishonest computation and data leakage due to selfishness, while clients may be reluctant to outsource computation due to high processing costs and malicious behaviour of servers. Addressing these issues, we propose a polynomial computation scheme based on game theory that achieves privacy computation and verifiability. Specifically, we formally construct a traditional two-party computation game model, analyse the benefits and motivations of the participants, and conclude that servers will generate selfish behaviours to break the protocol in order to maximize their benefits, resulting in damage to clients’ interests. Next, we propose a rational two-party polynomial computation protocol for efficient privacy computation between servers, and ensure the correctness of the computation based on a sampling verification technique and a deposit mechanism. Finally, game analysis proves that our scheme effectively constrains the selfish behaviour of service providers and conserves clients’ verification costs. Simulation experiments show that our scheme reduces the computation cost by more than 30% compared to other schemes.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"120 \",\"pages\":\"Article 109829\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790624007560\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790624007560","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
A rational and reliable model for outsourcing polynomial two-party computation
Outsourcing computation is a key technology for optimizing resource utilization and handling complex data tasks, especially when local resources are insufficient. However, service providers may trigger dishonest computation and data leakage due to selfishness, while clients may be reluctant to outsource computation due to high processing costs and malicious behaviour of servers. Addressing these issues, we propose a polynomial computation scheme based on game theory that achieves privacy computation and verifiability. Specifically, we formally construct a traditional two-party computation game model, analyse the benefits and motivations of the participants, and conclude that servers will generate selfish behaviours to break the protocol in order to maximize their benefits, resulting in damage to clients’ interests. Next, we propose a rational two-party polynomial computation protocol for efficient privacy computation between servers, and ensure the correctness of the computation based on a sampling verification technique and a deposit mechanism. Finally, game analysis proves that our scheme effectively constrains the selfish behaviour of service providers and conserves clients’ verification costs. Simulation experiments show that our scheme reduces the computation cost by more than 30% compared to other schemes.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.