2021
DOI: 10.1007/s12652-020-02633-4
|View full text |Cite
|
Sign up to set email alerts
|

A new entropic criterion model in rational secure two-party computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Wang et al 21 construct the player's utility function through information entropy, and use belief to solve the player's fairness problem. Zhang et al 23 predeposit deposits and construct agreements to make players choose honest strategies to achieve the fairness of the agreement. Based on TTP, the protocol proposed by Ah‐Fat et al 24 also achieves fairness, but due to the existence of TTP, this will lead to leakage of the privacy of the agreement.…”
Section: Simulations and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al 21 construct the player's utility function through information entropy, and use belief to solve the player's fairness problem. Zhang et al 23 predeposit deposits and construct agreements to make players choose honest strategies to achieve the fairness of the agreement. Based on TTP, the protocol proposed by Ah‐Fat et al 24 also achieves fairness, but due to the existence of TTP, this will lead to leakage of the privacy of the agreement.…”
Section: Simulations and Resultsmentioning
confidence: 99%
“…The proof and analysis results show that players gain utility when they comply with the protocol. What's more, when the player chooses a (2) Zhang et al 23 Safety within threshold Yes Deposit…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Kupcu et al [5] designed an incentive mechanism for rational delegating computation, which motivated the computing party to correctly executed the protocol and effectively prevented malicious computing parties from improper behavior. Zhang et al [6,7] combined game theory and safety entropy to design an entropy criterion model for rational secure two-party computation. This model selected the optimal utility function within the range of the safety entropy threshold through the relationship between safety entropy and utility function.…”
Section: Introductionmentioning
confidence: 99%