信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 34-39.doi: 10.3969/j.issn.1671-1122.2014.08.006

• Orginal Article • Previous Articles     Next Articles

Modeling and Simulation of Rational Cryptographic Protocols based on Swarm

YANG Xue-jun1, 2, CHEN Ning-jiang2   

  1. 1. Guangxi Institute of Electron Production Supervision and Inspection, Nanning Guangxi 530031, China;
    2. School of Computer and Electron Information, Guangxi University, Nanning Guangxi 530004, China
  • Received:2014-06-23 Online:2014-08-01

Abstract: Aiming at the question of number of strategies were chosen by participants in real world when the rational cryptographic protocols running, a model and the algorithm of solving this problem is designed, which simulated the rational actions on the Swarm platform of intelligent agents. Firstly, payoff matrix was defined in this article, and then, the state-copy formulation of participants is listed up; 3 Nash Equilibrium values discovered by solving the formulation, i.e., the different value which all the participants were used to honest strategy, tactics and non honesty mixed strategy, and game algorithm is designed according to the different values; at last, each object is defined in the main game needed on the Swarm, however, the basic object function can not fully meet rational cryptographic protocols on the Swarm, so the transformation of the Swarm platform part of the main object function given the key code transformation, the game of interaction in the whole swarm is implemented on the Swarm. As the result shows, rational participants will be difficult to reach Nash Equilibrium through rounds of game when the pay off function is constant. However, by using incentives to encourage the profits of honest participants, rational participants will be easy to Nash Equilibrium with less rounds of game, and the proportion of the honest participants is at least half the list. There are some reference values by using the algorithmic game theory that presents the methods which simulated on the Swarm platform for researching rational cryptographic protocols in this article.

Key words: network security, rational cryptographic protocols, Swarm, algorithmic game theory

CLC Number: