《山东大学学报(理学版)》 ›› 2018, Vol. 53 ›› Issue (11): 51-55.doi: 10.6040/j.issn.1671-9352.0.2018.430
Zhao-xia WU1(),Jia-qi WANG2,*()
摘要:
由于电子拍卖自身的高效性和公正性,因此基于无线频谱分配的拍卖机制应运而生,且满足了人们日益增长的无线通信服务需求。而安全的频谱拍卖算法是保证无线频谱拍卖机制安全运行的重要保障。通过分析无线频谱分配的算法特点和其所确保的安全需求,提出了一种无线单频谱安全拍卖算法。该算法结合无线频谱分配的拍卖特点与密码学机制来确保拍卖过程中信息的安全,并正确选出拍卖赢家,以及计算出赢家所需要支付的频谱拍卖价格。分析证明了算法具有较高的安全性。
中图分类号:
1 | VALENTA V, MARŠÁLEK R, BAUDOIN G, et al. Survey on spectrum utilization in Europe: measurements, analyses and observations[C]//Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), 2010 Proceedings of the Fifth International Conference on. New York: IEEE, 2010: 1-5. |
2 | CRAMTON P . Spectrum auction design[J]. Review of Industrial Organization, 2013, 42 (2): 161- 190. |
3 | WANG Xiaoyan, JI Yusheng, ZHOU Hao, et al. A privacy preserving truthful spectrum auction scheme using homomorphic encryption[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6. |
4 | ZHOU Minping, NIU Chaoyue, ZHENG Zhenzhe, et al. An efficient, privacy-preserving, and verifiable online auction mechanism for Ad exchanges[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6. |
5 |
WANG Qinhui , YE Baoliu , XU Tianyin , et al. Approximately truthful mechanisms for radio spectrum allocation[J]. IEEE Transactions on Vehicular Technology, 2015, 64 (6): 2615- 2626.
doi: 10.1109/TVT.2014.2345418 |
6 | ZHU Ruihao, LI Zhijing, WU Fan, et al. Differentially private spectrum auction with approximate revenue maximization[C]//Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing. New York: ACM, 2014: 185-194. |
7 | CHEN Zhili, HUANG Liusheng, LI Lu, et al. PS-TRUST: provably secure solution for truthful double spectrum auctions[C]//INFOCOM, 2014 Proceedings IEEE. New York: IEEE, 2014: 1249-1257. |
8 | LI Ming, LI Pan, GUO Linke, et al. PPER: privacy-preserving economic-robust spectrum auction in wireless networks[C]//Computer Communications (INFOCOM), 2015 IEEE Conference on. New York: IEEE, 2015: 909-917. |
9 |
HUANG He , LI Xiangyang , SUN Yue , et al. PPS: privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26 (5): 1393- 1404.
doi: 10.1109/TPDS.2014.2315200 |
[1] | 朱智强,马可欣,孙磊. 一种基于零知识证明的远程桌面认证协议[J]. 山东大学学报(理学版), 2016, 51(9): 47-52. |
[2] | 苏彬庭,许力,方禾,王峰. 基于Diffie-Hellman的无线Mesh网络快速认证机制[J]. 山东大学学报(理学版), 2016, 51(9): 101-105. |
[3] | 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106. |
[4] | 杜军威, 江峰, 张会萍, 曹玲, 殷文文. 基于图形转换的组合状态安全性验证技术[J]. 山东大学学报(理学版), 2014, 49(09): 41-49. |
[5] | 倪亮1,2,3,陈恭亮3,李建华3. eCK模型的安全性分析[J]. J4, 2013, 48(7): 46-50. |
[6] | 汪定1,2,薛锋1,王立萍1,马春光2. 改进的具有PFS特性的口令认证密钥协商方案[J]. J4, 2012, 47(9): 19-25. |
[7] | 巨春飞1,仇晓涛2,王保仓2,3. 基于矩阵环的快速公钥密码算法[J]. J4, 2012, 47(9): 56-59. |
[8] | 王侃1,吴磊2,3,郝蓉4. 一个弹性分布式数据安全方案[J]. J4, 2011, 46(9): 39-42. |
[9] | 阎召祥. ZS加密方案的选密安全性证明[J]. J4, 2010, 45(11): 115-121. |
[10] | 阎召祥 . 2m次根方案在同步攻击下的安全性证明[J]. J4, 2007, 42(4): 10-13 . |
|