[1] |
GOLDWASSER S , KALAI Y T , ROTHBLUM G N . Delegating computation:interactive proofs for muggles[C]// Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2008: 113-122.
|
[2] |
GOLDWASSER S , MICALI S , RACKOFF C . The knowledge complexity of interactive proof systems[J]. SIAM Journal on Computing, 1989,18(1): 186-208.
|
[3] |
ARORA S , SAFRA S . Probabilistic checking of proofs:a new characterization of NP[J]. Journal of the ACM, 1998,45(1): 70-122.
|
[4] |
BITANSKY N , CANETTI R , CHIESA A ,et al. From extractable collision resistance to succinct non-interactive arguments of knowledge,and back again[C]// Innovations in Theoretical Computer Science Conference. New York:ACM Press, 2012: 326-349.
|
[5] |
GENNARO R , GENTRY C , PARNO B ,et al. Quadratic span programs and succinct NIZKs without PCPs[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2013: 626-645.
|
[6] |
PARNO B , HOWELL J , GENTRY C ,et al. Pinocchio:nearly practical verifiable computation[C]// 2013 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2013: 238-252.
|
[7] |
COSTELLO C , FOURNET C , HOWELL J ,et al. Geppetto:versatile verifiable computation[C]// 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 253-270.
|
[8] |
BELENKIY M , CHASE M , ERWAY C C ,et al. Incentivizing outsourced computation[C]// Proceedings of the 3rd International Workshop on Economics of Networked Systems. New York:ACM Press, 2008: 85-90.
|
[9] |
KUPCU A . Incentivized outsourced computation resistant to malicious contractors[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(6): 633-649.
|
[10] |
DONG C Y , WANG Y L , ALDWEESH A ,et al. Betrayal,distrust,and rationality:smart counter-collusion contracts for verifiable cloud computing[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 211-227.
|
[11] |
TIAN Y L , GUO J , WU Y L ,et al. Towards attack and defense views of rational delegation of computation[J]. IEEE Access, 2019,7: 44037-44049.
|
[12] |
ZHANG Y , VAN D S M . Reputation-based incentive protocols in crowdsourcing applications[C]// 2012 Proceedings IEEE INFOCOM. Piscataway:IEEE Press, 2012: 2140-2148.
|
[13] |
MA X D , MA J F , LI H ,et al. RTRC:a reputation-based incentive game model for trustworthy crowdsourcing service[J]. China Communications, 2016,13(12): 199-215.
|
[14] |
JIANG X X , TIAN Y L . Rational delegation of computation based on reputation and contract theory in the UC framework[C]// International Conference on Security and Privacy in Digital Economy. Berlin:Springer, 2020: 322-335.
|
[15] |
CANETTI R , . Universally composable security:a new paradigm for cryptographic protocols[C]// Proceedings 42nd IEEE Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2001: 136-145.
|
[16] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R].(2008-10-31)[2021-01-04].
|
[17] |
李沓, 田有亮, 向康 ,等. 委托计算下基于区块链的公平支付方案[J]. 通信学报, 2020,41(3): 80-90.
|
|
LI T , TIAN Y L , XIANG K ,et al. Block-based fair payment scheme under delegation computation[J]. Journal on Communications, 2020,41(3): 80-90.
|
[18] |
尹鑫, 田有亮, 王海龙 . 公平理性委托计算协议[J]. 软件学报, 2018,29(7): 1953-1962.
|
|
YIN X , TIAN Y L , WANG H L . Fair and rational delegation computation protocol[J]. Journal of Software, 2018,29(7): 1953-1962.
|
[19] |
ZHANG Y H , DENG R H , LIU X M ,et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing[J]. Information Sciences, 2018,462: 262-277.
|
[20] |
KOSBA A , MILLER A , SHI E ,et al. Hawk:the blockchain model of cryptography and privacy-preserving smart contracts[C]// 2016 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2016: 839-858.
|
[21] |
JUELS A , KOSBA A , SHI E . The ring of gyges:investigating the future of criminal smart contracts[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 283-295.
|
[22] |
DORSALA M R , SASTRY V N , CHAPRAM S . Fair payments for verifiable cloud services using smart contracts[J]. Computers & Security, 2020,90: 101712.
|
[23] |
张维迎 . 博弈论与信息经济学[M]. 上海: 格致出版社, 2012.
|
|
ZHANG W Y . Game theory and information economics[M]. Shanghai: Gezhi Press, 2012.
|
[24] |
DELMOLINO K , ARNETT M , KOSBA A ,et al. Step by step towards creating a safe smart contract:lessons and insights from a cryptocurrency lab[C]// 2016 International Conference on Financial Cryptoraphy and Data Security. Berlin:Springer, 2016: 79-94.
|
[25] |
HUANG K L , KANHERE S S , HU W . On the need for a reputation system in mobile phone based sensing[J]. Ad Hoc Networks, 2014,12: 130-149.
|
[26] |
KENNEY J F , KEEPING E S . Mathematics of statistics-part one[M]. New York: D.van Nostrand, 1954.
|
[27] |
XIONG L , LIU L . PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
|
[28] |
KANG J W , XIONG Z H , NIYATO D ,et al. Incentive mechanism for reliable federated learning:a joint optimization approach to combining reputation and contract theory[J]. IEEE Internet of Things Journal, 2019,6(6): 10700-10714.
|