您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2018, Vol. 53 ›› Issue (11): 51-55.doi: 10.6040/j.issn.1671-9352.0.2018.430

•   • 上一篇    下一篇

一种无线单频谱安全拍卖算法

巫朝霞1(),王佳琪2,*()   

  1. 1. 新疆财经大学应用数学学院, 新疆 乌鲁木齐 830012
    2. 东北大学计算机科学与工程学院, 辽宁 沈阳 110819
  • 收稿日期:2018-07-24 出版日期:2018-11-01 发布日期:2018-11-14
  • 通讯作者: 王佳琪 E-mail:wuzhaoxia828@163.com;849598571@qq.com
  • 作者简介:巫朝霞(1975—),女,博士,副教授,研究方向为信息安全. E-mail:wuzhaoxia828@163.com
  • 基金资助:
    新疆自然科学基金资助项目(2014211A001)

Wireless single spectrum secure auction algorithm

Zhao-xia WU1(),Jia-qi WANG2,*()   

  1. 1. School of Applied Mathematics, Xinjiang University of Finance and Economics, Urumqi 830012, Xinjiang, China
    2. School of Computer Science and Engineering, Northeastern University, Shenyang 110819, Liaoning, China
  • Received:2018-07-24 Online:2018-11-01 Published:2018-11-14
  • Contact: Jia-qi WANG E-mail:wuzhaoxia828@163.com;849598571@qq.com
  • Supported by:
    新疆自然科学基金资助项目(2014211A001)

摘要:

由于电子拍卖自身的高效性和公正性,因此基于无线频谱分配的拍卖机制应运而生,且满足了人们日益增长的无线通信服务需求。而安全的频谱拍卖算法是保证无线频谱拍卖机制安全运行的重要保障。通过分析无线频谱分配的算法特点和其所确保的安全需求,提出了一种无线单频谱安全拍卖算法。该算法结合无线频谱分配的拍卖特点与密码学机制来确保拍卖过程中信息的安全,并正确选出拍卖赢家,以及计算出赢家所需要支付的频谱拍卖价格。分析证明了算法具有较高的安全性。

关键词: 电子拍卖, 频谱拍卖算法, 密码学机制, 安全性

Abstract:

Because of the efficiency and impartiality of the electronic auction itself, auction mechanisms which is based on wireless spectrum allocation come into being and meet the growing demand for wireless communication services. However, the secure spectrum auction algorithm is an important guarantee to ensure the operation safely of the wireless spectrum auction mechanism. According to analyze the algorithm characteristics of wireless spectrum allocation and the security requirements it ensures, a secure auction algorithm based on wireless single spectrum allocation is proposed. The algorithm combines the auction characteristics of the wireless spectrum allocation with the cryptographic mechanism to ensure the security of the information during the auction process, correctly select the auction winners, and calculate the spectrum auction price that the winner needs to pay. The analysis proves that it has higher security.

Key words: electronic auction, spectrum auction algorithm, cryptography technology, security

中图分类号: 

  • TP309

图1

无线单频谱分配安全拍卖的框架结构"

表1

互不冲突组公开信息表"

组编号 所在组的投标人编号 对应的投标值
1 g11, g12, …, g1|g1| bg11, bg12, …, bg1|g1|
2 g21, g22, …, g2|g2| bg21, bg22, …, bg2|g2|
l gl1, gl2, …, gl|gl| bgl1, bgl2, …, bgl|gl|

表2

互不冲突组公开信息表"

组编号 所在组的投标人编号 对应的双重加密投标值
1 g11, g12, …, g1|g1| E′(bg11), E′(bg12), …, E′(bg1|g1|)
2 g21, g22, …, g2|g2| E′(bg21), E′(bg22), …, E′(bg2|g2|)
l gl1, gl2, …, gl|gl| E′(bgl1), E′(bgl2), …, E′(bgl|gl|)
1 VALENTA V, MARŠÁLEK R, BAUDOIN G, et al. Survey on spectrum utilization in Europe: measurements, analyses and observations[C]//Cognitive Radio Oriented Wireless Networks & Communications (CROWNCOM), 2010 Proceedings of the Fifth International Conference on. New York: IEEE, 2010: 1-5.
2 CRAMTON P . Spectrum auction design[J]. Review of Industrial Organization, 2013, 42 (2): 161- 190.
3 WANG Xiaoyan, JI Yusheng, ZHOU Hao, et al. A privacy preserving truthful spectrum auction scheme using homomorphic encryption[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6.
4 ZHOU Minping, NIU Chaoyue, ZHENG Zhenzhe, et al. An efficient, privacy-preserving, and verifiable online auction mechanism for Ad exchanges[C]//Global Communications Conference (GLOBECOM), 2015 IEEE. New York: IEEE, 2015: 1-6.
5 WANG Qinhui , YE Baoliu , XU Tianyin , et al. Approximately truthful mechanisms for radio spectrum allocation[J]. IEEE Transactions on Vehicular Technology, 2015, 64 (6): 2615- 2626.
doi: 10.1109/TVT.2014.2345418
6 ZHU Ruihao, LI Zhijing, WU Fan, et al. Differentially private spectrum auction with approximate revenue maximization[C]//Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing. New York: ACM, 2014: 185-194.
7 CHEN Zhili, HUANG Liusheng, LI Lu, et al. PS-TRUST: provably secure solution for truthful double spectrum auctions[C]//INFOCOM, 2014 Proceedings IEEE. New York: IEEE, 2014: 1249-1257.
8 LI Ming, LI Pan, GUO Linke, et al. PPER: privacy-preserving economic-robust spectrum auction in wireless networks[C]//Computer Communications (INFOCOM), 2015 IEEE Conference on. New York: IEEE, 2015: 909-917.
9 HUANG He , LI Xiangyang , SUN Yue , et al. PPS: privacy-preserving strategyproof social-efficient spectrum auction mechanisms[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26 (5): 1393- 1404.
doi: 10.1109/TPDS.2014.2315200
[1] 朱智强,马可欣,孙磊. 一种基于零知识证明的远程桌面认证协议[J]. 山东大学学报(理学版), 2016, 51(9): 47-52.
[2] 苏彬庭,许力,方禾,王峰. 基于Diffie-Hellman的无线Mesh网络快速认证机制[J]. 山东大学学报(理学版), 2016, 51(9): 101-105.
[3] 唐乾,杨飞,黄琪,林果园. 基于TCB子集的访问控制信息安全传递模型[J]. 山东大学学报(理学版), 2016, 51(7): 98-106.
[4] 杜军威, 江峰, 张会萍, 曹玲, 殷文文. 基于图形转换的组合状态安全性验证技术[J]. 山东大学学报(理学版), 2014, 49(09): 41-49.
[5] 倪亮1,2,3,陈恭亮3,李建华3. eCK模型的安全性分析[J]. J4, 2013, 48(7): 46-50.
[6] 汪定1,2,薛锋1,王立萍1,马春光2. 改进的具有PFS特性的口令认证密钥协商方案[J]. J4, 2012, 47(9): 19-25.
[7] 巨春飞1,仇晓涛2,王保仓2,3. 基于矩阵环的快速公钥密码算法[J]. J4, 2012, 47(9): 56-59.
[8] 王侃1,吴磊2,3,郝蓉4. 一个弹性分布式数据安全方案[J]. J4, 2011, 46(9): 39-42.
[9] 阎召祥. ZS加密方案的选密安全性证明[J]. J4, 2010, 45(11): 115-121.
[10] 阎召祥 . 2m次根方案在同步攻击下的安全性证明[J]. J4, 2007, 42(4): 10-13 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 杨军. 金属基纳米材料表征和纳米结构调控[J]. 山东大学学报(理学版), 2013, 48(1): 1 -22 .
[2] 孙小婷1,靳岚2*. DOSY在寡糖混合物分析中的应用[J]. J4, 2013, 48(1): 43 -45 .
[3] 罗斯特,卢丽倩,崔若飞,周伟伟,李增勇*. Monte-Carlo仿真酒精特征波长光子在皮肤中的传输规律及光纤探头设计[J]. J4, 2013, 48(1): 46 -50 .
[4] 杨伦,徐正刚,王慧*,陈其美,陈伟,胡艳霞,石元,祝洪磊,曾勇庆*. RNA干扰沉默PID1基因在C2C12细胞中表达的研究[J]. J4, 2013, 48(1): 36 -42 .
[5] 冒爱琴1, 2, 杨明君2, 3, 俞海云2, 张品1, 潘仁明1*. 五氟乙烷灭火剂高温热解机理研究[J]. J4, 2013, 48(1): 51 -55 .
[6] 李永明1, 丁立旺2. PA误差下半参数回归模型估计的r-阶矩相合[J]. J4, 2013, 48(1): 83 -88 .
[7] 赵同欣1,刘林德1*,张莉1,潘成臣2,贾兴军1. 紫藤传粉昆虫与花粉多型性研究[J]. 山东大学学报(理学版), 2014, 49(03): 1 -5 .
[8] 汤晓宏1,胡文效2*,魏彦锋2,蒋锡龙2,张晶莹2,. 葡萄酒野生酿酒酵母的筛选及其生物特性的研究[J]. 山东大学学报(理学版), 2014, 49(03): 12 -17 .
[9] 王碧玉,曹小红*. 算子矩阵的Browder定理的摄动[J]. 山东大学学报(理学版), 2014, 49(03): 90 -95 .
[10] 郭兰兰1,2,耿介1,石硕1,3,苑飞1,雷丽1,杜广生1*. 基于UDF方法的阀门变速关闭过程中的#br# 水击压强计算研究[J]. 山东大学学报(理学版), 2014, 49(03): 27 -30 .