信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 34-39.doi: 10.3969/j.issn.1671-1122.2014.08.006

• 技术研究 • 上一篇    下一篇

基于Swarm平台的理性密码协议建模与仿真

杨雪君1, 2, 陈宁江2   

  1. 1. 广西壮族自治区电子信息产品监督检验所,广西南宁 530031;
    2. 广西大学计算机与电子信息学院,广西南宁 530004
  • 收稿日期:2014-06-23 出版日期:2014-08-01
  • 作者简介:杨雪君(1971-),女,广西,高级工程师,研究生,主要研究方向:电子与信息技术、信息安全;陈宁江(1975-),男,广西,教授,博士,主要研究方向:软件工程、网络分布式计算。
  • 基金资助:
    广西自然科学基金[2013GXNSFAA25303]、广西科学研究与技术开发计划[1348020-7]

Modeling and Simulation of Rational Cryptographic Protocols based on Swarm

YANG Xue-jun1, 2, CHEN Ning-jiang2   

  1. 1. Guangxi Institute of Electron Production Supervision and Inspection, Nanning Guangxi 530031, China;
    2. School of Computer and Electron Information, Guangxi University, Nanning Guangxi 530004, China
  • Received:2014-06-23 Online:2014-08-01

摘要: 针对现实世界中理性密码协议的参与者博弈过程不易观察和预测的问题,文章在多智能主体的仿真平台Swarm上对理性密码协议中参与者的诚实策略和非诚实策略行为进行了建模和仿真。文章首先定义了主体的收益矩阵,进一步根据收益矩阵建立了参与者在整个博弈过程中的状态复制方程;然后求解出该方程的三个均衡点,即所有参与者分别采用诚实策略、非诚实策略和混合策略时的不同均衡点取值,根据这三个取值设计了协议执行过程中主体间的博弈算法;最后,文章在Swarm平台上定义了博弈主体所需要的各个对象。由于Swarm平台上的基本对象功能不能完全满足理性密码协议仿真的需要,文章改造了Swarm平台上部分主体对象功能,给出了改造的关键代码,对协议交互过程中的博弈行为进行了仿真。仿真的实验结果表明,Swarm仿真工具可以有效观察到参与者的理性选择过程;并通过调节博弈算法中的收益参数来达到预期效果,使博弈在较少的次数内达到博弈的稳定均衡,同时使得选择诚实策略的参与者占总人数的一半以上。文章提出在Swarm平台上进行理性密码协议仿真的方法,对使用计算方法研究理性密码协议具有一定的参考价值。

关键词: 网络安全, 理性密码协议, 博弈实验, 计算博弈论

Abstract: Aiming at the question of number of strategies were chosen by participants in real world when the rational cryptographic protocols running, a model and the algorithm of solving this problem is designed, which simulated the rational actions on the Swarm platform of intelligent agents. Firstly, payoff matrix was defined in this article, and then, the state-copy formulation of participants is listed up; 3 Nash Equilibrium values discovered by solving the formulation, i.e., the different value which all the participants were used to honest strategy, tactics and non honesty mixed strategy, and game algorithm is designed according to the different values; at last, each object is defined in the main game needed on the Swarm, however, the basic object function can not fully meet rational cryptographic protocols on the Swarm, so the transformation of the Swarm platform part of the main object function given the key code transformation, the game of interaction in the whole swarm is implemented on the Swarm. As the result shows, rational participants will be difficult to reach Nash Equilibrium through rounds of game when the pay off function is constant. However, by using incentives to encourage the profits of honest participants, rational participants will be easy to Nash Equilibrium with less rounds of game, and the proportion of the honest participants is at least half the list. There are some reference values by using the algorithmic game theory that presents the methods which simulated on the Swarm platform for researching rational cryptographic protocols in this article.

Key words: network security, rational cryptographic protocols, Swarm, algorithmic game theory

中图分类号: