计算机科学 ›› 2018, Vol. 45 ›› Issue (11): 115-123.doi: 10.11896/j.issn.1002-137X.2018.11.017
陆正福, 普艳红, 倪盛斌, 许辰铭, 杨春尧
LU Zheng-fu, PU Yan-hong, NI Sheng-bin, XU Chen-ming, YANG Chun-yao
摘要: 理性交换协议(REP)因使用了理想化的理性假设,在现实中有可能失效。为解决此协议失效的问题,基于与现实更为接近的有限理性假设(BRH),定义了有限理性公平概念,并首次基于BRH设计了有限理性公平数据交换协议(FDEP-BR)。理论分析表明,与REP相比,FDEP-BR虽然牺牲了一定效率(轮复杂度为O(l*v)),但具有容错性和有限理性公平性,能够抵抗非合作攻击。对FDEP-BR构造自动机模型,并改进经验加权吸引(EWA)学习模型的决策方式,设计了EWA学习决策算法;在此基础上,基于Jade-Repast集成平台对FDEP-BR进行了仿真,仿真结果表明FDEP-BR的均衡状态与预期具有一致性。
中图分类号:
[1]ASOKAN N.Fairness in electroniccommerce[D].Waterloo: University of Waterloo,1998. [2]SYVERSON P.Weakly secret bit commitment:Applications to lotteries and fair exchange[C]∥Proceedings of the 11th IEEE Computer Security Foundations Workshop.1998:2-13. [3]BUTTYÁN L,HUBAUX J P.Toward a Formal Model of Fair Exchange-a Game Theoretic Approach Technical Report SSC/1999/039[R].Epfl,1999:1-16. [4]BUTTYÁN L.Removing the financial incentive to cheat inmicro payment schemes[J].Electronics Letters,2000,36(2):132-133. [5]BUTTYÁN L,JEAN-PIERRE H.Rational Exchange-A Formal Model Based on Game Theory[M]∥Electronic Commerce.Berlin:Springer,2001:114-126. [6]BUTTYÁN L,HUBAUX J P,CˇAPKUN S.A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson’s Protocol[J].Journal on Computer Security,2004,12(3-4):551-587. [7]BUTTYÁN L,HUBAUX J P,CAPKUN S.A Formal Analysis of Syverson’s Rational Exchange Protocol[C]∥Computer Security Foundations Workshop(CSFW).IEEE,2002:193. [8]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CA- STRO J C,et al.An extended model of rational exchange based on dynamic games of imperfect information[M]∥Emerging Trends in Information and Communication Security.Berlin:Springer,2006:396-408. [9]ESTEVEZ-TAPIADOR J M,ALCAIDE A,HERNANDEZ-CAS- TRO J C,et al.Bayesian rational exchange[J].International Journal of Information Security,2008,7(1):85-100. [10]ALCAIDE A,ESTEVEZ-TAPIADOR J M,HERNANDEZ-CAS- TRO J C,et al.A multi-party rational exchange protocol[C]∥Proceedings of Workshops on the Move to Meaningful Internet Systems.Berlin:Springer,2007:42-43. [11]CAMPOS F A,PHAM V.Rational information exchange mo- del:A new optimization approach for equilibrium computing[C]∥Proceedings of the 6th International Conference on Modeling,Simulation,and Applied Optimization.IEEE,2015:1-6. [12]TAO X,LI G,SUN D,et al.A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds[J].Future Generation Computer Systems,2016,76:582-589. [13]LV Z,PENG C G,LIU H,et al.Rational fairness exchange protocols based on maximum entropy principle[J].Application Research of Computers,2014,31(2):563-567.(in Chinese) 吕桢,彭长根,刘海,等.基于极大熵原理的理性公平交换协议[J].计算机应用研究,2014,31(2):563-567. [14]LIU H,PENG C G,ZHANG H,et al.Game Logic Formal Model of Rational Secure Protocol[J].Computer Science,2015,42(9):118-126.(in Chinese) 刘海,彭长根,张弘,等.一种理性安全协议的博弈逻辑描述模型[J].计算机科学,2015,42(9):118-126. [15]NIU C C,PENG C G,LI X.Rational Model of Exchange Protocol and Its Mechanism Design on Fairness[J].Application Research of Computer,2017,34(5):1504-1508.(in Chinese) 牛翠翠,彭长根,李新.一种交换协议的理性模型及其公平机制设计[J].计算机应用研究,2017,34(5):1504-1508. [16]ZHAO J,WU X H,TAO J.A Rational Exchange Protocol Model Based on Dynamic Game[J].Computer Applications and Software,2011,28(7):121-124.(in Chinese) 赵君,吴小红,陶杰.一种基于动态博弈的理性交换协议模型[J].计算机应用与软件,2011,28(7):121-124. [17]ZHOU X,JIN J H,LI Y B,et al.Multi-Party Fair Exchange Protocol Based on Rational Secure Sharing[J].Journal of Information Engineering University,2016,17(6):705-708.(in Chinese) 周燮,金江浩,李延斌,等.基于理性秘密共享的多方公平交换协议[J].信息工程大学学报,2016,17(6):705-708. [18]SIMON H A.A Behavioral Model of Rational Choice[J].Quarterly Journal of Economics,1955,69(1):99-118. [19]ELLSBERG D.Risk,Ambiguity,and the Savage Axioms[J].Quarterly Journal of Economics,1961,75(4):643-669. [20]ALLAIS M,HAGEN O.Expected Utility Hypotheses and the Allais Paradox[J].Journal of the American Statistical Association,1979,79(385):224. [21]HALPERN J,TEAGUE V.Rational secret sharing and multiparty computation:extendedabstract[C]∥Thirty-Sixth ACM Symposium on Theory of Computing.ACM,2004:623-632. [22]TIAN Y,MA J,PENG C,et al.Secret Sharing Scheme with Fairness[C]∥IEEE International Conference on Trust,Security and Privacy in Computing and Communications.IEEE,2011:494-500. [23]CAMERER C,HO T H.Experience-weighted Attraction Lear- ning in Normal Form Games-Camerer-2003-Econometrica - Wiley Online Library[J].Econometrica,2010,67(4):827-874. [24]NI S B.Design and Implementation of Two Kinds of Multi-agent Platform Integration Schemes[D].Kunming:Yunnan University,2015.(in Chinese) 倪盛斌.两种多主体平台集成方案的设计与实现[D].昆明:云南大学,2015. |
[1] | 朱凯, 毋国庆, 袁梦霆. 关于同步部分规约的有限自动机的优化问题的近似难度 On Hardness of Approximation for Optimized Problem of Synchronizing Partially Specified Deterministic Finite Automata 计算机科学, 2020, 47(5): 14-21. https://doi.org/10.11896/jsjkx.200200073 |
[2] | 沈丹丹,王立华,王宇,王振洲. AODV协议在渔船超短波自组网中的仿真与分析 Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network 计算机科学, 2016, 43(Z6): 285-287. https://doi.org/10.11896/j.issn.1002-137X.2016.6A.068 |
[3] | 董昱,高雪娟. 基于场景的联锁软件形式化模型生成方法 Method for Generating Formal Interlocking Software Model Based on Scenario 计算机科学, 2015, 42(1): 193-195. https://doi.org/10.11896/j.issn.1002-137X.2015.01.043 |
[4] | 张亚红,张琳琳,赵楷,陈佳丽,冯在文. 基于UML2.0序列图的Web服务运行时验证方法 Runtime Verification Method for Web Service Based on UML2.0Sequence Diagrams 计算机科学, 2013, 40(7): 138-138. |
[5] | 杜文超,陈庶樵,胡宇翔. 基于DoLFA的高效正则表达式匹配算法 Efficient Regular Expression Matching Algorithm Based on DoLFA 计算机科学, 2012, 39(9): 15-19. |
[6] | 王晶 戎玫 张广泉 祝义. 基于概率模型检测的Web服务组合验证 Validation of Web Service Composition Based on Probabilistic Model Checking 计算机科学, 2012, 39(1): 120-123. |
[7] | . BPEL应用程序验证模型研究 计算机科学, 2009, 36(4): 163-165. |
[8] | 覃泳睿 孙未未 张卓瑶 余平. 基于有限自动机的XML过滤技术研究综述 计算机科学, 2008, 35(12): 19-23. |
[9] | . 有限状态自动机的并行确定化及过程分析 计算机科学, 2006, 33(10): 293-294. |
[10] | . 一种基于有限自动机的渐变镜头检测算法 计算机科学, 2006, 33(1): 252-254. |
[11] | 马新新 陈伟 秦志光. 蜜罐系统模型的有限自动机 计算机科学, 2005, 32(11): 75-77. |
[12] | 敖丽敏 王树大 郭永洪. 一种基于分层Petri网的软件工作流开发模型 计算机科学, 2004, 31(B09): 234-237. |
[13] | 向生建 刘勇 杨四铭 佘堃 熊光泽. WTLS关键协议的仿真研究 计算机科学, 2004, 31(8): 43-45. |
[14] | 张峰 秦志光 刘锦德 张险峰. 电子商务安全体系结构 计算机科学, 2002, 29(11): 121-123. |
[15] | 胡佩华 王永成 刘功申. 基于有序二叉树的多模式匹配算法 计算机科学, 2002, 29(11): 65-68. |
|