Computer Science ›› 2018, Vol. 45 ›› Issue (11): 115-123.doi: 10.11896/j.issn.1002-137X.2018.11.017

• Information Security • Previous Articles     Next Articles

Design and Simulation of Fair Data Exchange Protocol with Bounded Rationality

LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao   

  1. (School of Mathematics and Statistics,Yunnan University,Kunming 650500,China)
  • Received:2018-06-22 Published:2019-02-25

Abstract: Rational exchange protocol may fail in reality because of the use of the idealized rationality hypothesis.In order to solve the protocol failure problem,based on bounded rationality hypothesis which is more consistent with the reality,the concept of bounded rational fairness was defined and fair data exchange protocol with bounded rationality(FDEP-BR)was designed for the first time.The theoretical analysis shows that the FDEP-BR can resist non-cooperative attack because of its fault-tolerance and bounded rationality fairness at the cost of round complexity Ο(l*v)compared with the rational exchange protocol.A finite automata model for FDEP-BR was constructed,the decision-making method for experiential weighted attraction(EWA) learning model was improved,and the EWA learning decision algorithm was designed.Then the FDEP-BR was simulated on the Jade-Repast integration platform.The simulation results show that the equilibrium state of the FDEP-BR is consistent with expectations.

Key words: Bounded rational fairness, Bounded rationality, Fair data exchange protocol, Finite automata, Protocol simulation

CLC Number: 

  • TP393
[1]ASOKAN N.Fairness in electroniccommerce[D].Waterloo: University of Waterloo,1998.
[2]SYVERSON P.Weakly secret bit commitment:Applications to lotteries and fair exchange[C]∥Proceedings of the 11th IEEE Computer Security Foundations Workshop.1998:2-13.
[3]BUTTYÁN L,HUBAUX J P.Toward a Formal Model of Fair Exchange-a Game Theoretic Approach Technical Report SSC/1999/039[R].Epfl,1999:1-16.
[4]BUTTYÁN L.Removing the financial incentive to cheat inmicro payment schemes[J].Electronics Letters,2000,36(2):132-133.
[5]BUTTYÁN L,JEAN-PIERRE H.Rational Exchange-A Formal Model Based on Game Theory[M]∥Electronic Commerce.Berlin:Springer,2001:114-126.
[6]BUTTYÁN L,HUBAUX J P,CˇAPKUN S.A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson’s Protocol[J].Journal on Computer Security,2004,12(3-4):551-587.
[7]BUTTYÁN L,HUBAUX J P,CAPKUN S.A Formal Analysis of Syverson’s Rational Exchange Protocol[C]∥Computer Security Foundations Workshop(CSFW).IEEE,2002:193.
[8]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CA- STRO J C,et al.An extended model of rational exchange based on dynamic games of imperfect information[M]∥Emerging Trends in Information and Communication Security.Berlin:Springer,2006:396-408.
[9]ESTEVEZ-TAPIADOR J M,ALCAIDE A,HERNANDEZ-CAS- TRO J C,et al.Bayesian rational exchange[J].International Journal of Information Security,2008,7(1):85-100.
[10]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CAS- TRO J C,et al.A multi-party rational exchange protocol[C]∥Proceedings of Workshops on the Move to Meaningful Internet Systems.Berlin:Springer,2007:42-43.
[11]CAMPOS F A,PHAM V.Rational information exchange mo- del:A new optimization approach for equilibrium computing[C]∥Proceedings of the 6th International Conference on Modeling,Simulation,and Applied Optimization.IEEE,2015:1-6.
[12]TAO X,LI G,SUN D,et al.A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds[J].Future Generation Computer Systems,2016,76:582-589.
[13]LV Z,PENG C G,LIU H,et al.Rational fairness exchange protocols based on maximum entropy principle[J].Application Research of Computers,2014,31(2):563-567.(in Chinese)
吕桢,彭长根,刘海,等.基于极大熵原理的理性公平交换协议[J].计算机应用研究,2014,31(2):563-567.
[14]LIU H,PENG C G,ZHANG H,et al.Game Logic Formal Model of Rational Secure Protocol[J].Computer Science,2015,42(9):118-126.(in Chinese)
刘海,彭长根,张弘,等.一种理性安全协议的博弈逻辑描述模型[J].计算机科学,2015,42(9):118-126.
[15]NIU C C,PENG C G,LI X.Rational Model of Exchange Protocol and Its Mechanism Design on Fairness[J].Application Research of Computer,2017,34(5):1504-1508.(in Chinese)
牛翠翠,彭长根,李新.一种交换协议的理性模型及其公平机制设计[J].计算机应用研究,2017,34(5):1504-1508.
[16]ZHAO J,WU X H,TAO J.A Rational Exchange Protocol Model Based on Dynamic Game[J].Computer Applications and Software,2011,28(7):121-124.(in Chinese)
赵君,吴小红,陶杰.一种基于动态博弈的理性交换协议模型[J].计算机应用与软件,2011,28(7):121-124.
[17]ZHOU X,JIN J H,LI Y B,et al.Multi-Party Fair Exchange Protocol Based on Rational Secure Sharing[J].Journal of Information Engineering University,2016,17(6):705-708.(in Chinese)
周燮,金江浩,李延斌,等.基于理性秘密共享的多方公平交换协议[J].信息工程大学学报,2016,17(6):705-708.
[18]SIMON H A.A Behavioral Model of Rational Choice[J].Quarterly Journal of Economics,1955,69(1):99-118.
[19]ELLSBERG D.Risk,Ambiguity,and the Savage Axioms[J].Quarterly Journal of Economics,1961,75(4):643-669.
[20]ALLAIS M,HAGEN O.Expected Utility Hypotheses and the Allais Paradox[J].Journal of the American Statistical Association,1979,79(385):224.
[21]HALPERN J,TEAGUE V.Rational secret sharing and multiparty computation:extendedabstract[C]∥Thirty-Sixth ACM Symposium on Theory of Computing.ACM,2004:623-632.
[22]TIAN Y,MA J,PENG C,et al.Secret Sharing Scheme with Fairness[C]∥IEEE International Conference on Trust,Security and Privacy in Computing and Communications.IEEE,2011:494-500.
[23]CAMERER C,HO T H.Experience-weighted Attraction Lear- ning in Normal Form Games-Camerer-2003-Econometrica - Wiley Online Library[J].Econometrica,2010,67(4):827-874.
[24]NI S B.Design and Implementation of Two Kinds of Multi-agent Platform Integration Schemes[D].Kunming:Yunnan University,2015.(in Chinese)
倪盛斌.两种多主体平台集成方案的设计与实现[D].昆明:云南大学,2015.
[1] ZHU Kai, WU Guo-qing, YUAN Meng-ting. On Hardness of Approximation for Optimized Problem of Synchronizing Partially Specified Deterministic Finite Automata [J]. Computer Science, 2020, 47(5): 14-21.
[2] ZHANG Ju-xiao. Application of Nondeterministic Finite Automata in Braille Transcoding [J]. Computer Science, 2017, 44(1): 271-276.
[3] SHEN Dan-dan, WANG Li-hua, WANG Yu and WANG Zhen-zhou. Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network [J]. Computer Science, 2016, 43(Z6): 285-287.
[4] ZHANG Ya-hong,ZHANG Lin-lin,ZHAO Kai,CHEN Jia-li and FENG Zai-wen. Runtime Verification Method for Web Service Based on UML2.0Sequence Diagrams [J]. Computer Science, 2013, 40(7): 138-138.
[5] GUO Yan-yan and LIU Jing-lei. Formalization for Model Element of UML Statechart in RSL [J]. Computer Science, 2013, 40(5): 177-183.
[6] . Efficient Regular Expression Matching Algorithm Based on DoLFA [J]. Computer Science, 2012, 39(9): 15-19.
[7] . Validation of Web Service Composition Based on Probabilistic Model Checking [J]. Computer Science, 2012, 39(1): 120-123.
[8] LI Yan (College of Information Science and Engineering, Zhejiang Normal University, Jinhua 321004). [J]. Computer Science, 2006, 33(2): 155-157.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!