In the rational cryptographic protocol, the two rational players often fall into the prisoner's dilemma, which is also the case for the rational secret sharing we consider in this paper. First, it is proved that r...
详细信息
In the rational cryptographic protocol, the two rational players often fall into the prisoner's dilemma, which is also the case for the rational secret sharing we consider in this paper. First, it is proved that rational secret sharing has a sequential equilibrium in the natural state, so that rational participants will fall into the prisoner's dilemma, resulting in no participants being able to reconstruct the secret ***, to solve this problem, we propose an incentive-compatible rational secret scheme. Specifically, the game tree with imperfect information is constructed to facilitate our analysis and proof, and the strictly dominated strategies are directly eliminated to simplify the game tree. Further more, we describe the motivation of the verifier. Then, we prove that rational players have no motivation to deviate from honest behavior using sequential equilibrium so that rational players can reconstruct the secret correctly. Finally, we complete the simulation using the smart contract and analyze our entire scheme. In addition, the game of our scheme does not need to be repeated multiple times to reach sequential equilibrium, i.e., the game always follows the rational path.
At present, the pattern of China’s e-commerce retail market has been basically formed, Ali already occupies the first place in the market with more than half of the market share, and Jingdong accounts for less than 5...
详细信息
Face completion is a challenging task since the facial textures and structures are hard to be captured and generated. Meanwhile, the blank area is usually completed by an average face, which may blur the individual in...
详细信息
With the rapid development of 5G and the Internet of Things (IoT), the traditional cloud computing architecture struggle to support the booming computation-intensive and latency-sensitive applications. Mobile edge com...
详细信息
In the process of fluorine material research and development, the traditional "manual"analysis method can no longer meet the needs of large and complex high-dimensional data analysis. This paper proposes Dec...
详细信息
We tackle the network topology inference problem by utilizing Laplacian constrained Gaussian graphical models, which recast the task as estimating a precision matrix in the form of a graph Laplacian. Recent research [...
详细信息
Vehicle ad-hoc networks (VANETs) play a critical role in providing security and privacy protection for intelligent transportation systems. However, the limited network bandwidth and computing capacity within VANETs ha...
详细信息
The promptness of decision-making is of paramount importance in coordinate decision-making communication systems. In this paper, we envision a system in which a sender transmits information to a receiver for decision-...
详细信息
To accurately count densely stacked rebars belongs to semantic segmentation in image. Various methods have been proposed to segment the objects in single image. However, widely and densely stacking scene such as wareh...
详细信息
Relation prediction in knowledge graphs (KGs) aims at predicting missing relations in incomplete triples, whereas the dominant paradigm by KG embeddings has a limitation to predict the relation between unseen entities...
详细信息
暂无评论