[1] |
KHAN W Z , AHMED E , HAKAK S ,et al. Edge computing:a survey[J]. Future Generation Computer Systems, 2019,97: 219-235.
|
[2] |
HABIBI P , FARHOUDI M , KAZEMIAN S ,et al. Fog computing:a comprehensive architectural survey[J]. IEEE Access, 2020,8: 69105-69133.
|
[3] |
GAI K K , GUO J N , ZHU L H ,et al. Blockchain meets cloud computing:a survey[J]. IEEE Communications Surveys & Tutorials, 2020,22(3): 2009-2030.
|
[4] |
谭振华, 杨广明, 王兴伟 ,等. 面向云存储的多维球面门限秘密共享方案[J]. 软件学报, 2016,27(11): 2912-2928.
|
|
TAN Z H , YANG G M , WANG X W ,et al. Threshold secret sharing scheme based on multidimensional sphere for cloud storage[J]. Journal of Software, 2016,27(11): 2912-2928.
|
[5] |
ATTASENA V , DARMONT J , HARBI N . Secret sharing for cloud data security:a survey[J]. The VLDB Journal, 2017,26(5): 657-681.
|
[6] |
马利民, 王佳慧 . 基于改进FEMD算法的可逆秘密图像共享方案[J]. 通信学报, 2019,40(7): 48-56.
|
|
MA L M , WANG J H . Invertible secret image sharing scheme based on improved FEMD[J]. Journal on Communications, 2019,40(7): 48-56.
|
[7] |
CAPUTO S , KORCHMáROS G , SONNINO A . Multilevel secret sharing schemes arising from the normal rational curve[J]. Discrete Applied Mathematics, 2020,284: 158-165.
|
[8] |
YANG J , FU F W . New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem[J]. IET Information Security, 2020,14(6): 783-790.
|
[9] |
DESMEDT Y , SLINKO A . Realistic versus rational secret sharing[C]// Lecture Notes in Computer Science. Berlin:Springer, 2019: 152-163.
|
[10] |
HALPERN J , TEAGUE V . Rational secret sharing and multiparty computation:extended abstract[C]// Proceedings of the thirty-sixth annual ACM symposium on Theory of computing – STOC’04. New York:ACM Press, 2004: 623-632.
|
[11] |
MALEKA S , SHAREEF A , PANDU R C . The deterministic protocol for rational secret sharing[C]// Proceedings of 2008 IEEE International Symposium on Parallel and Distributed Processing. Piscataway:IEEE Press, 2008: 1-7.
|
[12] |
MALEKA S , SHAREEF A , RANGAN C P . Rational secret sharing with repeated games[C]// Information Security Practice and Experience. Berlin:Springer, 2008: 334-346.
|
[13] |
KOL G , NAOR M . Cryptography and game theory:designing protocols for exchanging information[C]// Theory of Cryptography. Berlin:Springer, 2008: 320-339.
|
[14] |
KOL G , NAOR M . Games for exchanging information[C]// Proceedings of the fortieth annual ACM symposium on Theory of computing. New York:ACM Press, 2008: 423-432.
|
[15] |
FUCHSBAUER G , KATZ J , NACCACHE D . Efficient rational secret sharing in standard communication networks[C]// Theory of Cryptography. Berlin:Springer, 2010: 419-436.
|
[16] |
CAI Y Q , SHI H L . Rational secret sharing scheme based on probability encryption without trusted center[J]. Journal of Networks, 2011,6(6): 899-903.
|
[17] |
DANI V , MOVAHEDI M , SAIA J . Scalable mechanisms for rational secret sharing[J]. Distributed Computing, 2015,28(3): 171-187.
|
[18] |
KAWACHI A , OKAMOTO Y , TANAKA K ,et al. General constructions of rational secret sharing with expected constant-round reconstruction[J]. The Computer Journal, 2016,60(5): 711-728.
|
[19] |
ZHANG Z F , LIU M L . Unconditionally secure rational secret sharing in standard communication networks[C]// Information Security and Cryptology - ICISC 2010. Berlin:Springer, 2011: 355-369.
|
[20] |
ZHANG E , YUAN P Y , DU J . Verifiable rational secret sharing scheme in mobile networks[J]. Mobile Information Systems, 2015,2015: 1-7.
|
[21] |
DE S J , RUJ S . Failure tolerant rational secret sharing[C]// Proceedings of 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). Piscataway:IEEE Press, 2016: 925-932.
|
[22] |
田有亮, 王雪梅, 刘琳芳 . 基于马尔可夫决策的理性秘密共享方案[J]. 通信学报, 2015,36(9): 222-229.
|
|
TIAN Y L , WANG X M , LIU L F . Rational secret sharing scheme based on Markov decision[J]. Journal on Communications, 2015,36(9): 222-229.
|
[23] |
NOJOUMIAN M , STINSON D R . Socio-rational secret sharing as a new direction in rational cryptography[C]// Lecture Notes in Computer Science. Berlin:Springer, 2012: 18-37.
|
[24] |
NOJOUMIAN M , . Generalization of socio-rational secret sharing with a new utility function[C]// Proceedings of 2014 Twelfth Annual International Conference on Privacy,Security and Trust. Piscataway:IEEE Press, 2014: 338-341.
|
[25] |
WANG Y L , XU Q L . 2-out-of-2 rational secret sharing in extensive form[C]// Proceedings of 2011 Seventh International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2011: 847-851.
|
[26] |
TIAN Y L , PENG C G , LIN D D ,et al. Bayesian mechanism for rational secret sharing scheme[J]. Science China Information Sciences, 2015,58(5): 1-13.
|
[27] |
WANG J , CAI Y Q . A rational secret sharing scheme based on repeated game[C]// Proceedings of 2011 Seventh International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2011: 615-619.
|
[28] |
YU Y , ZHOU Z F . An efficient rational secret sharing protocol resisting against malicious adversaries over synchronous channels[C]// Information Security and Cryptology. Berlin:Springer, 2013: 69-89.
|
[29] |
彭长根, 刘海, 田有亮 ,等. 混合偏好模型下的分布式理性秘密共享方案[J]. 计算机研究与发展, 2014,51(7): 1476-1485.
|
|
PENG C G , LIU H , TIAN Y L ,et al. A distributed rational secret sharing scheme with hybrid preference model[J]. Journal of Computer Research and Development, 2014,51(7): 1476-1485.
|
[30] |
ASHAROV G , LINDELL Y . Utility dependence in correct and fair rational Secret Sharing[J]. Journal of Cryptology, 2011,24(1): 157-202.
|
[31] |
DE S J , PAL A K . Achieving correctness in fair rational secret sharing[C]// Cryptology and Network Security. Cham:Springer International Publishing, 2013: 139-161.
|
[32] |
DE S J , RUJ S , PAL A K . Should silence be heard? fair rational secret sharing with silent and non-silent players[C]// Cryptology and Network Security. Cham:Springer International Publishing, 2014: 240-255.
|
[33] |
JIN J H , ZHOU X , MA C G ,et al. A rational secret sharing relying on reputation[C]// Proceedings of 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS). Piscataway:IEEE Press, 2016: 384-387.
|
[34] |
NOJOUMIAN M , STINSON D R , GRAINGER M . Unconditionally secure social secret sharing scheme[J]. IET Information Security, 2010,4(4): 202.
|
[35] |
GORDON S D , KATZ J . Rational secret sharing,revisited[C]// Lecture Notes in Computer Science. Berlin:Springer, 2006: 229-241.
|
[36] |
ABRAHAM I , DOLEV D , GONEN R ,et al. Distributed computing meets game theory:robust mechanisms for rational secret sharing and multiparty computation[C]// Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing. New York:ACM Press, 2006: 53-62.
|
[37] |
MICALI S , SHELAT A . Purely rational secret sharing (extended abstract)[C]// Theory of Cryptography. Berlin:Springer, 2009: 54-71.
|
[38] |
ONG S J , PARKES D C , ROSEN A ,et al. Fairness with an honest minority and a rational majority[C]// Theory of Cryptography. Berlin:Springer, 2009: 36-53.
|
[39] |
ZHANG Z F , LIU M L . Rational secret sharing as extensive games[J]. Science China Information Sciences, 2013,56(3): 1-13.
|
[40] |
SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613.
|
[41] |
STADLER M , . Publicly verifiable secret sharing[C]// Advances in Cryptology — EUROCRYPT’96. Berlin:Springer, 1996: 190-199.
|