+

CN106714183B - Heterogeneous spectrum allocation method for protecting privacy - Google Patents

Heterogeneous spectrum allocation method for protecting privacy Download PDF

Info

Publication number
CN106714183B
CN106714183B CN201710045759.5A CN201710045759A CN106714183B CN 106714183 B CN106714183 B CN 106714183B CN 201710045759 A CN201710045759 A CN 201710045759A CN 106714183 B CN106714183 B CN 106714183B
Authority
CN
China
Prior art keywords
buyer
auctioneer
auction
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710045759.5A
Other languages
Chinese (zh)
Other versions
CN106714183A (en
Inventor
陈志立
车瑞红
仲红
崔杰
许艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN201710045759.5A priority Critical patent/CN106714183B/en
Publication of CN106714183A publication Critical patent/CN106714183A/en
Application granted granted Critical
Publication of CN106714183B publication Critical patent/CN106714183B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/02Resource partitioning among network components, e.g. reuse partitioning
    • H04W16/10Dynamic resource partitioning
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a heterogeneous spectrum allocation method for protecting privacy, which comprises the following steps: initializing; submitting a quotation; a safety grouping step: the auctioneer calculates an interference pattern, replaces the interference pattern, doubly encrypts the quotation information and sends the quotation information to the auction agency; the auction agency executes a grouping algorithm, encrypts the replaced buyer identity aiming at each group member, randomizes all double-encryption quotation information, and sends the security operation result of the grouping to the auctioneer; the auctioneer decrypts the outer encryption of the randomized double encrypted offer message; a winner selection step: the auction agent generates an encryption circuit corresponding to the auction algorithm, and the circuit realizes the functions of group pricing and winner selection and sends the functions to the auctioneer; the auctioneer receives the encryption circuit, shares buyer's quotation information and buyer's identity with the auction agency secret, calculates the encryption circuit; and a final pricing step, the invention does not reveal any information about the bid to any participant during the auction process except the outcome of the auction.

Description

Heterogeneous spectrum allocation method for protecting privacy
Technical Field
The invention relates to the technical field of network and information security, in particular to a heterogeneous spectrum allocation method for protecting privacy based on an encryption circuit and a homomorphic encryption technology.
Background
The wireless spectrum is a limited resource. With the wide application of various wireless communication technologies, people have increasingly growing demands for spectrum resources, and the problem of scarcity of spectrum resources is more and more prominent. The dynamic spectrum auction reallocates the idle frequency band of the original user to a new user for use by means of a proper auction mechanism, improves the utilization efficiency of spectrum resources, further alleviates the problem of spectrum scarcity, and gradually becomes an effective spectrum allocation mode.
Currently, most dynamic spectrum auction mechanisms consider the problem of homogeneous spectrum auction, that is, buyers pay the same price to all frequency bands or form the same interference pattern for all frequency band buyers, which causes the disadvantages of low potential spectrum utility, low buyer satisfaction, and the like.
In order to solve the above problems, a document [ TAMES: a truthfull Auction Mechanism for heterogeneous Spectrum Allocation, 2013] proposes a real Auction Mechanism for heterogeneous Spectrum Allocation, which better solves the heterogeneous Spectrum Allocation problem, and the detailed scheme is as follows:
initializing relevant information of buyers and frequency spectrums aiming at a client host (a buyer requesting frequency spectrum resources), a computing server (an auctioneer providing the frequency spectrum resources and executing an auction mechanism) and an assisting server (a third-party platform realizing non-profit assistance, namely an auction agency); in a network environment formed by all equipment, constructing a corresponding interference graph aiming at each frequency band, searching the largest non-conflicting buyer group in each graph, and matching the corresponding frequency band; the quotation mode of each non-conflicting buyer group is as follows: the price quoted by the buyer is equal to the product of the lowest price quoted in the buyer and the value obtained by subtracting one from the number of the group members; if the group quote is larger than the corresponding frequency band reserve price, the buyer group wins the frequency band use right; except for the one with the lowest bid in the group, the remaining buyers are winners, and each winner's payment is the group's minimum bid.
The simulation result of the scheme proves that compared with a homogeneous quotation and a working medium interference graph, TAMES obtains higher buyer satisfaction and frequency spectrum effectiveness.
In the process of implementing the invention, the inventor finds that: existing heterogeneous spectrum auction mechanisms (e.g., TAMES) do not take into account the issue of buyer privacy protection during the auction process. In a TAMES auction process, where the auctioneer obtains a true valuation of all buyers, a dishonest auctioneer can easily obtain additional benefits by modifying the auction results (e.g., raising the winner's payment). However, the buyer knows the real valuations of other buyers in some way (such as wiretapping), and then in the next same auction, the buyer is likely to manipulate the price of the buyer so as to improve the utility of the buyer and further destroy the integrity of the auction.
Buyer quotation is the important privacy of buyer in heterogeneous spectrum allocation process, and it is necessary to technically realize its privacy protection to avoid its reasonable fair operation that influences heterogeneous spectrum allocation.
Disclosure of Invention
The invention aims to provide a heterogeneous spectrum allocation method for protecting privacy, and the method is used for solving the problem of buyer quotation privacy protection in the existing heterogeneous spectrum auction.
Therefore, the invention provides a heterogeneous spectrum allocation method for protecting privacy, which comprises the following steps: an initialization step: respectively initializing respective basic information by a buyer, an auctioneer and an auction agency; submitting a quote: the buyer uses the auction agency public key to encrypt the quotation information of the frequency spectrum, and the quotation information is sent to the auctioneer in combination with the identity of the buyer; a safety grouping step: the auctioneer calculates an interference pattern, replaces the interference pattern, doubly encrypts the quotation information and sends the quotation information to the auction agency; the auction agency executes a grouping algorithm, encrypts the replaced buyer identity aiming at each group member, randomizes all double-encryption quotation information, and sends the security operation result of the grouping to the auctioneer; the auctioneer decrypts the outer layer encryption of the randomized double-encrypted quotation information, and the buyer identity and the quotation information only relate to the auction agency public key at the moment; a winner selection step: the auction agent generates an encryption circuit corresponding to the auction algorithm, and the circuit realizes the functions of group pricing and winner selection and sends the functions to the auctioneer; the auctioneer receives the encryption circuit, shares buyer quotation information and buyer identity with the auction agency secret, and calculates the encryption circuit; and a final pricing step: and obtaining the winning buyer and the buyer payment price of the frequency spectrum according to the output result of the encryption circuit.
Further, in the initialization step, the buyer initializes own position information and quotation information for each frequency band; the auctioneer initializes the own public and private key pair, the interference threshold value and the reserve price of each frequency band, and informs the auction agent of the public key; the auction agent initializes its own public-private key pair and advertises its public key to the buyer and auctioneer.
Further, in the security grouping step, the auctioneer calculates an interference graph, encrypts the buyer quotation information again by using the public key of the auctioneer, randomly replaces the buyer number in the interference graph, and sends the operation result to the auction agency; the auction agency randomizes all double-encrypted quotation information, encrypts buyer pseudo numbers by using the own public key, executes a heterogeneous spectrum grouping algorithm, and sends a grouping result to the auctioneer, wherein the pseudo numbers are replaced numbers; after receiving the grouping result, the auctioneer uses the private key to decrypt the outer layer encryption of the double-encryption quotation, and the buyer pseudo number and the quotation information in the grouping result are encrypted by using the public key of the auction agency.
Further, in the winner selection step, the auction agent generates an encryption circuit corresponding to an auction algorithm and sends the encryption circuit to the auctioneer; the auction broker receiving circuit is cooperated with the auction broker to execute secret sharing operation of the buyer quotation information and the buyer pseudo code, and further label the information; the auctioneer implements an encryption circuit to enable buyer group quotes and winner selection.
Further, the auctioneer is a computing server, the auction proxy is an assistance server, and the buyer is a plurality of client hosts.
And (3) safety analysis: the heterogeneous spectrum allocation method for protecting privacy provided by the invention realizes the security of cryptography, namely, any information related to quotation except the auction result is not leaked to any participant in the auction process.
Compared with the scheme in the prior art, the invention has the following advantages:
(1) the invention researches the privacy protection problem on the basis of heterogeneous spectrum auction. The existing privacy-protecting spectrum auction work mainly aims at the situation of homogeneous spectrum auction and does not consider the problem of spectrum heterogeneity. The existing heterogeneous spectrum allocation method does not consider the privacy protection problem. The heterogeneity of the spectrum allows privacy protection issues to become more complex and challenging. Aiming at the problems, the invention provides a heterogeneous spectrum allocation method for protecting privacy for the first time.
(2) The invention realizes higher safety. The designed privacy protection method can not only protect the bids of the buyers, namely, not reveal any information about the bids except the auction result, but also protect the identities of the pricing buyers in each winning buyer group, namely, although the auction result publishes the pricing of each winning buyer group as the minimum bid of the group, the buyer corresponding to the minimum bid is still unknown.
Therefore, the method and the device provided by the invention expand the space for the progress of the privacy protection field of the frequency spectrum auction and have a good practical effect.
In addition to the objects, features and advantages described above, other objects, features and advantages of the present invention are also provided. The present invention will be described in further detail below with reference to the drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a flow chart of a heterogeneous spectrum allocation method according to the present invention;
FIG. 2 is a functional block diagram illustrating a heterogeneous spectrum allocation method according to the present invention; and
fig. 3a and fig. 3b are schematic diagrams before and after replacing interference maps of 2 frequency bands in a heterogeneous spectrum allocation method according to an assumed embodiment of the present invention, where fig. 3a is a schematic diagram before and after replacing an interference map of a frequency band 1, and fig. 3b is a schematic diagram before and after replacing an interference map of a frequency band 2.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
In the present invention, the constructed network environment includes buyers, auctioneers, and auction agencies. The auctioneer sells the frequency spectrum resource to the buyer in an auction mode; the buyer provides service for the user by using the frequency spectrum resources obtained by the auction; the auction broker is responsible for assisting the auctioneer in completing privacy protection of the buyer's information. The auctioneer here may be a computing server; the buyer can be a client host and a server and provides service to the client; the auction agent may be an assistance server.
First, the auctioneer and auction broker cooperate to perform a series of secure interaction operations for buyer grouping, these operations being mainly based on Pallier additive homomorphic encryption System [ Pascal Pallier, "Public-Key cryptosystem based on Composite developer responsiveness Classes", EUROCRYPT' 99 ]; and then an Auction agent generates an encryption circuit corresponding to an Auction algorithm, and an auctioneer executes the encryption circuit, wherein the Auction algorithm is in a document [ TAMES: A Truthful Auction Mechanism for Heterogeneous Spectrum Allocation, 2013], so that the bidding privacy of buyers is effectively protected while the Heterogeneous Spectrum Auction result is calculated.
Referring to fig. 1 and 2 in combination, the heterogeneous spectrum allocation method of the present invention includes the following steps: an initialization step S11, a submit quote step S13, a secure grouping step S15, a winner selection step S17, and a final pricing step S19.
Wherein the initialization step comprises: a buyer initializes own position information and quotation information of each frequency band; the auctioneer initializes the private and public key pair, the interference threshold value and the reserve price of each frequency band, and the auctioning agent of the public key channel; the auction agency initializes its own public-private key pair and channels its public key to the buyer and auctioneer.
Wherein the step of submitting a quote comprises: each buyer encrypts the bid information using the auction agent's public key and sends the encrypted bid information to the auctioneer.
Wherein the step of securely grouping comprises: the auctioneer calculates the interference graph, encrypts the buyer quotation information again by using the public key of the auctioneer, randomly replaces the buyer number in the interference graph and sends the operation result to the auction agency; the auction agency randomizes all double-encrypted quotation information, encrypts buyer pseudo numbers (replaced numbers) by using the own public key, executes a heterogeneous spectrum grouping algorithm, and sends a grouping result to the auctioneer; after receiving the grouping result, the auctioneer uses the private key of the auctioneer to decrypt the outer encryption of the double encryption quotation. So far, the buyer pseudo number and the quotation information in the grouping result are encrypted by using the public key of the auction agency.
Wherein the winner selecting step comprises: the auction agent generates an encryption circuit corresponding to the auction algorithm and sends the encryption circuit to the auctioneer; the auctioneer receiving circuit cooperates with the auction agency to execute secret sharing operation of the buyer quotation information and the buyer pseudo number, and further labels the information, and the auctioneer executes the encryption circuit to realize the quotation of the buyer group and the selection of the winner.
Wherein the final pricing step comprises: for each winning buyer group, except the pricing buyer (the buyer with the lowest price quoted for pricing), the other buyers are winners; the winning set of buyers' lowest bid is the required payment price for each winner in the set of buyers.
The following describes the steps of the heterogeneous spectrum allocation method according to an embodiment of the present invention in detail:
(1) and an initialization step
Consider that in a network environment for performing heterogeneous spectrum auctions, there is one computing server (auctioneer simulation implements a spectrum seller), one helper server (auction broker), and n client hosts (buyers), where the seller has k bands { s } [j1, 2.., k }, each frequency band sjInterference threshold of djCorresponding reserve value of rjEach buyer i (i ═ 1, 2.., n) is required to purchase only one frequency band sj. Let buyer i pair frequency band sjIs quoted as
Figure BDA0001215520970000051
The bid vector for i can be expressed as:
Figure BDA0001215520970000061
simultaneously, the position of the memory i is (x)i,yi). In the invention, the public key encryption uses a Paillier homomorphic encryption system, and the company key pairs of the auctioneer and the auction agency are (pk)a,ska) And (pk)b,skb) And the public key is announced to the other side, and authenticated and safe communication channels exist between the user and the auctioneer, and between the auctioneer and the auction agency.
(2) Submitting quotation step
Buyer i (i ═ 1, 2.., n) receives auction agent's public key pkbThen, the encryption algorithm E meeting Paillier semantic security is utilized to encrypt the frequency band sj(j-1, 2.. k) price quote
Figure BDA0001215520970000062
Grouping encrypted offers for each user i
Figure BDA0001215520970000063
To the auctioneer.
(3) A step of safe grouping
(3.1) double encryption and permutation
The auctioneer follows the location information (x) of buyer i ( i 1, 2.., n)i,yi) Sum frequency band sjInterference threshold d ofjCalculating to obtain an interference pattern G of each section of frequency spectrumj(j ═ 1, 2,. k); the auctioneer uses his own public key pkaAnd encrypting the buyer's offer information again:
Figure BDA0001215520970000064
to obtain
Figure BDA0001215520970000065
Then all interference patterns pi (G) are replacedj) ( j 1, 2.. k.) so that the buyer number in the interference map is replaced by a pseudo number i from the original i*(ii) a Finally, the auctioneer encrypts the double-encrypted quotation information (i) of all buyers*,βi) And (i ═ 1, 2.., n) and the permuted interference pattern are sent to the auction agency.
(3.2) grouping and processing
After receiving the information from the auctioneer, the auction agency executes a buyer grouping algorithm aiming at heterogeneous spectrum allocation, and the buyer grouping algorithm is executed in a frequency band s1Corresponding interference pattern G1In, find the largest non-conflicting group g1(ii) a In frequency band s2Corresponding interference pattern G2Wherein deletion is contained in g1Obtaining interference graph G 'of all buyers in'2And in G'2Finding the maximum non-conflicting group g2(ii) a And so on until in frequency band skCorresponding interference pattern GkWherein deletion is contained in g1,g2,...,gk-1Obtaining interference graph G 'of all buyers in'kAnd in G'kMiddle searching maximum non-conflict buyer group gk. And finally obtaining a buyer group set G (G)1,g2,...,gk) Satisfy the requirement of
Figure BDA0001215520970000066
For buyer group gjThe pseudo number in (1 is more than or equal to j and less than or equal to k) is i*Buyer of (2) using public key pkbEncrypted buyer pseudo-number i*To obtain
Figure BDA0001215520970000071
And randomize its double encrypted quote
Figure BDA0001215520970000072
To obtain
Figure BDA0001215520970000073
Finally, the processed buyer i information is obtained as
Figure BDA0001215520970000074
Each buyer in all the buyer groups is processed similarly to obtain the processed grouping result and send them to the auctioneer.
(3.3) obtaining packet information
After the auctioneer receives the message, it is goodUsing its own private key skaThe result of decrypting the previously randomized double encrypted quote information:
Figure BDA0001215520970000075
at this time, the pseudo number and the encrypted offer information of each buyer are combined into
Figure BDA0001215520970000076
Involving only the public key pk of the auction agencybWhere "+ 0" denotes the randomization process.
The benefits of the randomization operation described above are: if no randomization is performed, the auction broker sends the buyer information directly
Figure BDA0001215520970000077
For the auctioneer, the auctioneer can use his own private key skaOuter layer encryption of decrypted double encrypted quote information
Figure BDA0001215520970000078
Can be matched with the original information
Figure BDA0001215520970000079
By comparison, tau is deduced from the same encrypted quoteiThe corresponding true number is i.
The advantages of adopting the buyer grouping algorithm are as follows: in each frequency band sj(j ═ 1, 2.. times, k) corresponding interference map GjDeleting the grouped buyers, and searching the maximum conflict-free buyer group g in the formed interference graphjAnd g isjAnd adding the new buyer group into the formed buyer group set. Any two buyers in the generated buyer group can share the same frequency band without mutual interference, and the spatial multiplexing of the frequency spectrum is realized.
(4) And the step of winner selection
(4.1) encryption Circuit
The auction agent generates an encryption circuit corresponding to the auction algorithm. The encryption circuit is composed of basic circuits such as an adder circuit, a multiplier circuit, and a comparator circuit, and refer toDocument [ Improved Garbled Circuit Building blocks and Applications to Automation and Computing Minima, 2009]And respectively realize that: restoring original quote information
Figure BDA0001215520970000081
And buyer pseudo number i*The label of (1); calculating offers of non-conflicting buyer groupsjThe label of (1); calculating the frequency band sjPseudo number of winner i*And the price paid by the winner
Figure BDA0001215520970000082
(4.2) input tag calculation
To encrypt the input information (including the pseudo-numbers and offers of all buyers in the group of all buyers), the auctioneer and the auction broker first need to collaborate for secret sharing of the input information: for any buyer i in any buyer group, the auctioneer randomly selects a message r1And r2Using the auction agency's public key pkbRespectively calculate
Figure BDA0001215520970000083
Transmitting using the property of the addition homomorphic encryption algorithm E (a) xE (b) E (a + b)
Figure BDA0001215520970000084
And
Figure BDA0001215520970000085
to the auction agency, the auction agency receives
Figure BDA0001215520970000086
And
Figure BDA0001215520970000087
then use its own private key skbDecrypting the received encrypted message to obtain i*-r1And
Figure BDA0001215520970000088
to this end, realize buyingSecret sharing of information of the auctioneer i between the auctioneer and the auction broker, i.e. the share of the auctioneer is (r) for each buyer information1,r2) And the auction agent's share is
Figure BDA0001215520970000089
Next, the auctioneer and the auction broker perform tagging according to the secret shared information: the auction agency transmits the information of each buyer i to the corresponding share
Figure BDA00012155209700000810
Labeling, sending to the auctioneer, and the auctioneer receiving the label of the buyer i information and the share (r) corresponding to the buyer information1,r2) The pseudo number and the quotation of the buyer i can be obtained by calculation through an addition circuit
Figure BDA00012155209700000811
A corresponding label. As to the reserve valence rj(j ═ 1, 2.. times, k), since it is the information provided by the auctioneer, it can be input to the encryption circuit in the form of a constant term.
(4.3) encryption Circuit calculation
Once the tag entries required by the encryption circuit are ready, the auctioneer may execute the encryption circuit. The encryption circuit mainly realizes two functions: buyer group pricing and winner determination. The buyer group pricing is realized according to the following steps:
Figure BDA0001215520970000091
when the buyer group g does not conflict with each otherjGroup quote of phij>rjThen, the buyer group is the winning buyer group. Each winning buyer group gjThe other buyers except the pricing buyer are the winners, and the winners win the frequency band sjThe right of use. The encryption circuit ultimately returns all winning buyer groups, the pseudo-number set of winning buyers in each winning buyer group and the lowest bid price for each winning buyer group. Finally, the auctioneer assigns a pseudo-number i to each winning buyer i*According to the above-mentioned replacement changeAnd (6) changing pi and recovering to the real serial number i.
(5) Final pricing step
The union of the winning buyers in all the winning buyer groups, each g, is the winner set of the auctionjWinning buyer in the game, winning the frequency band s corresponding to the buyer groupjAnd paying the minimum price of the group
Figure BDA0001215520970000092
The heterogeneous spectrum allocation method of the embodiment has the following advantages:
(1) the invention researches the privacy protection problem on the basis of heterogeneous spectrum auction. The existing privacy-protecting spectrum auction work mainly aims at the situation of homogeneous spectrum auction and does not consider the problem of spectrum heterogeneity. The existing heterogeneous spectrum auction scheme does not consider the problem of protecting privacy. The heterogeneity of the spectrum allows privacy protection issues to become more complex and challenging. In order to solve the problems, a heterogeneous spectrum auction scheme for protecting privacy is provided for the first time.
(2) The method organically combines three security technologies, namely homomorphic encryption, an encryption circuit and secret sharing, achieves privacy protection in heterogeneous spectrum auction, and meanwhile well controls execution efficiency of a security scheme, so that the scheme is more practical.
(3) The present invention provides several novel design techniques in the design process. Randomizing the double encrypted offer, such as using a Paillier encryption system, which has not been seen in the prior literature; ciphertext encrypted by the Paillier system is converted into a label of an encryption circuit through an additive secret sharing technology, so that the ciphertext does not need to be transmitted at a loss, and the ciphertext is not found in the existing research.
(4) The invention realizes higher safety. The privacy protection scheme is designed to protect not only the bids of the buyers, i.e. not reveal any information about the bids except the auction result, but also the identities of the pricing buyers in each winning buyer group, i.e. although the auction result publishes the pricing of each winning buyer group as the minimum bid of the group, the buyer corresponding to the minimum bid is still unknown.
The heterogeneous spectrum allocation method according to the present invention is described below by taking 1 assisting server and 5 client hosts as examples, and with reference to fig. 1, fig. 2, fig. 3a and fig. 3b, the method includes the following processes:
(1) initialization step
The 5 client hosts respectively identify 5 buyer identities according to host sequence numbers 1, 2, 3, 4 and 5, coordinates (0,70), (50, 70), (110, 35), (0, 0) and (50,0) are randomly generated, and the position information of the 5 buyers is respectively identified. The 1 computation server identifies one seller, and the seller has 2 frequency bands, so that the computation server sets frequency band interference thresholds to be 80 and 60 respectively, and corresponding reserve prices to be 4 and 3 respectively. The valuation range of the buyers is between 0 and 10, and 5 buyers are respectively provided with (9,6), (5,4), (7,6), (6,2) and (4,5) valuations of 2 frequency bands. For simplicity, the following description will be described with reference to the buyer, auctioneer and auction agency, and the public-private key pairs of the auctioneer and auction agency are labeled as (pk) respectivelya,ska) And (pk)b,skb) And simultaneously, the public keys of the two public keys are mutually announced.
(2) Submitting a quote step
Each buyer encrypts its own bid information using the auction agency's public key and then submits the information to the auctioneer in the format of:
Figure BDA0001215520970000101
containing the buyer number and the encrypted quote information. For example, buyer 1 submissions
Figure BDA0001215520970000102
To the auctioneer, here 1 is the buyer number.
(3) Step of secure grouping
(3.1) auctioneer: double encryption and permutation
The auctioneer judges whether any two buyers interfere with each other according to a distance formula, and calculates the original interference graphs of the two frequency bands. The auctioneer then uses his or her ownPublic key pkaAnd doubly encrypting the quotation information to obtain the buyer number and the doubly encrypted quotation information thereof:
Figure BDA0001215520970000103
Figure BDA0001215520970000111
the auctioneer then employs the following random permutation rule
Figure BDA0001215520970000112
And (3) replacing to generate a buyer pseudo number, and obtaining the buyer pseudo number and the double-encrypted quotation information form as follows:
Figure BDA0001215520970000113
and finally, the auctioneer sends the operation result and the replaced interference graph to the auction agency. Note that: after the auction agency receives these messages, neither the true number of each node nor their bid information is known, so the auction agency then proceeds to "blind" grouping.
(3.2) auction agency: grouping and processing
The auction agency obtains the non-conflict buyer groups of 2 frequency bands g according to the searching algorithm of the maximum non-conflict buyer groups 14, 3 and g 25, 2. The auction broker then processes the buyer information in the two buyer groups, i.e. using its own public key pkbEncrypting the pseudo-number and randomizing the doubly encrypted quote information to obtain g1And g2The processed packet information is respectively as follows:
the auction agent sends the above processed packet information to the auctioneer. Note that "+ 0" here indicates that the randomization operation is performed.
(3.3) auctioneer: obtaining packet information
After receiving the processed grouping information, the auctioneer uses the private key sk thereofaDecrypting the randomized double encrypted bid information to obtain the auction proxy public key pkbEncrypted packet information of (1):
Figure BDA0001215520970000114
Figure BDA0001215520970000121
(4) winner selection step
(4.1) encryption Circuit
The auction agent generates an encryption circuit corresponding to the auction algorithm and sends the encryption circuit to the auctioneer.
(4.2) input tag calculation
The auctioneer and auction proxy then cooperate to complete the secret sharing of the grouped information. Let us assume that secret sharing conversion is performed by selecting a specific random number, and the share of the grouped information shared by the auctioneers is obtained as follows:
g1:{(3,2),(5,3)},
g2:{(9,6),(-9,12)}
and the auction agent's share is:
g1:{(1,7),(-2,1)},
g2:{(-4,-2),(11,-10)}
assuming G (.) is a tagging function, the auction agent tags its share to obtain:
g1:{(G(1),G(7)),(G(-2),G(1))},
g2:{(G(-4),G(-2)),(G(11),G(-10))}
the auction agent sends the self-tagged shares to the auctioneer, and the auctioneer listens the tagged shares and the self-corresponding shares to an adding circuit for addition, such as g1The first buyer of the group can be calculated as G (4) ═ G (1) +3, G (9) ═ G (7) +2, and finally the result is obtainedThe input labels to the packet information are:
g1:{(G(4),G(9)),(G(3),G(4))},
g2:{(G(5),G(4)),(G(2),G(2))},
in addition, the reserve value r14 and r2Since the information is known to the auctioneer, 3 can be input to the encryption circuit as a constant term.
(4.3) encryption Circuit calculation
Once the tag entries required by the encryption circuit are ready, the auctioneer may implement the encryption circuit by first, according to a buyer group quotation formula
Figure BDA0001215520970000131
Computing
Φ1=G(4)×(2-1)=G(4)
Φ2=G(2)×(2-1)=G(2)
Secondly, whether the buyer group wins is judged through a comparison circuit. Due to phi1=G(4)≥r1=4,Φ2=G(2)<r2G is equal to 31For winning buyer group, and g2Not. Finally, the encryption circuit returns g1The buyer with the pseudo number 4 is the winner, wins the frequency band s1Group g1The minimum bid is 4.
(5) Final pricing step
According to (4.3), buyer group g1Gain the use right of the frequency band because of having
Figure BDA0001215520970000132
The true number of the final winning buyer is 1 and the required payment price is 4.
Simulation analysis
The following is a specific implementation of the method.
Our simulation experiments are based on FastGC, a circuit library function written in the Java language that can construct cryptographic circuits. In the experiment, two processes, namely server and client, are adopted to simulate an auctioneer and an auction agency, and the two parties are in windows1064-bit operating system, Intel CoreTMThe steps of the invention are executed on a platform of i5-45903.30GHz processor and 16GB memory.
During the experiment, some parameters were set as follows:
we assume that all buyers are randomly distributed in a 100m by 100m area, the interference threshold of each spectrum is uniformly selected between 20-80 m, the buyer quotation and the reserve price of the spectrum are randomly selected in integers [1..50] and [1..150], respectively, and the default length of all the numbers is 16 bits. Tables 1 and 2 are given, where the data are the average results of ten runs of the simulation experiment.
Table 1 shows a running time comparison table of PATH and TAMES, in table 1, the fixed spectrum number K is 120, n (number of buyers) is uniformly changed from 400 to 2400, and the running times of our encryption scheme PATH and unencrypted scheme TAMES are tested. For the convenience of statistics, the operation of rounding the test result is adopted, and as can be seen from the comparison of the running time cost of the two schemes in the table 1, the scheme can be selected in practical application and has high practical value.
Table 1:
Figure BDA0001215520970000141
table 2 shows a running time and communication cost table of the PATH, in table 2, the fixed spectrum number K is 100, n (the number of buyers) is uniformly changed from 1000 to 8000, and the costs of the encryption scheme PATH in the running time and the communication cost are tested on the premise of large data, in table 2, n is 9.5446min in the running time of 8000 and the communication cost is 116.2225mb, so that the scheme can perform spectrum auction for processing a large amount of data in batch, and has the advantages of high running speed and high distribution efficiency. Safe and reliable lamp characteristics.
Table 2:
Figure BDA0001215520970000142
Figure BDA0001215520970000151
the above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (2)

1.一种保护隐私的异质频谱分配方法,其特征在于,包括以下步骤:1. a heterogeneous spectrum allocation method of protecting privacy, is characterized in that, comprises the following steps: 初始化步骤:买家、拍卖者、拍卖代理分别初始化各自的基本信息;Initialization steps: the buyer, the auctioneer, and the auction agent initialize their basic information respectively; 提交报价步骤:买家使用拍卖代理公钥加密频谱的报价信息,结合买家身份,发送给拍卖者;Steps of submitting a bid: The buyer encrypts the bid information of the spectrum with the public key of the auction agent, and sends it to the auctioneer in combination with the buyer's identity; 安全分组步骤:拍卖者计算干扰图,置换干扰图,双重加密报价信息,发送给拍卖代理;拍卖代理执行分组算法,针对每组成员,对置换后的买家身份进行加密,随机化所有双重加密报价信息,把对分组进行的安全操作结果发送拍卖者;拍卖者解密随机化的双重加密报价信息的外层加密,此时的买家身份和报价信息仅涉及拍卖代理公钥;Security grouping steps: the auctioneer calculates the interference graph, replaces the interference graph, double encrypts the quotation information, and sends it to the auction agent; the auction agent executes the grouping algorithm, encrypts the replaced buyer identity for each group member, and randomizes all double encryption Bidding information, send the result of the security operation on the group to the auctioneer; the auctioneer decrypts the outer encryption of the randomized double-encrypted quotation information, and the buyer's identity and quotation information at this time only involve the public key of the auction agent; 胜者选定步骤:拍卖代理生成拍卖算法对应的加密电路,该电路实现小组定价和胜者选定功能,将其发送给拍卖者;拍卖者接收所述加密电路,同拍卖代理秘密共享买家报价信息和买家身份,计算加密电路;以及Winner selection step: the auction agent generates an encryption circuit corresponding to the auction algorithm, which implements the functions of group pricing and winner selection, and sends it to the auctioneer; the auctioneer receives the encryption circuit and secretly shares the buyer with the auction agent Offer information and buyer identities, computing encrypted circuits; and 最终定价步骤:依据所述加密电路的输出结果,得到频谱的获胜买家和买家支付价格,Final pricing step: According to the output result of the encryption circuit, the winning buyer of the spectrum and the price paid by the buyer are obtained, 在所述初始化步骤中,买家初始化自己的位置信息和对各个频段的报价信息;拍卖者初始化自己的公私钥对、各个频段的干扰阈值和保留价,并将其公钥通告拍卖代理;拍卖代理初始化自己的公私钥对,并将其公钥通告买家和拍卖者,In the initialization step, the buyer initializes its own location information and quotation information for each frequency band; the auctioneer initializes its own public-private key pair, the interference threshold and reserve price of each frequency band, and informs the auction agent of its public key; The agent initializes its own public-private key pair and announces its public key to buyers and auctioneers, 在所述安全分组步骤中,拍卖者计算干扰图,使用自己的公钥再次加密买家报价信息,而后随机置换干扰图中的买家编号,将上述操作结果发送给拍卖代理;拍卖代理随机化所有的双重加密报价信息,使用自己的公钥加密买家伪编号,所述伪编号为已被置换过的编号,执行分组算法,并将分组结果发送给拍卖者;拍卖者接收到分组结果后,使用自己的私钥解密双重加密报价的外层加密,分组结果中的买家伪编号和报价信息均使用拍卖代理的公钥进行加密,In the security grouping step, the auctioneer calculates the interference graph, re-encrypts the buyer's quotation information with his own public key, and then randomly replaces the buyer number in the interference graph, and sends the above operation result to the auction agent; the auction agent randomizes All double-encrypted quotation information, use its own public key to encrypt the buyer's pseudo-number, the pseudo-number is the number that has been replaced, execute the grouping algorithm, and send the grouping result to the auctioneer; after the auctioneer receives the grouping result , use your own private key to decrypt the outer encryption of the double-encrypted quotation, the buyer's pseudo-number and quotation information in the grouping result are encrypted with the public key of the auction agent, 在所述胜者选定步骤中,所述拍卖代理生成拍卖算法对应的加密电路,将该加密电路发送给拍卖者;拍卖者接收电路,与拍卖代理合作执行买家报价信息和买家伪编码的秘密分享操作,并进而对这些信息进行标签化;拍卖者执行加密电路,以实现买家组报价和胜者选定,In the winner selection step, the auction agent generates an encryption circuit corresponding to the auction algorithm, and sends the encryption circuit to the auctioneer; the auctioneer receives the circuit, and cooperates with the auction agent to execute the buyer's quotation information and the buyer's pseudocode the secret sharing operation of the auctioneer, and then tagging this information; the auctioneer implements the encryption circuit to realize the bidder group quotation and the winner selection, 在所述最终定价步骤中,对每个获胜买家组,除去定价买家外,其余买家均为获胜者;获胜买家组最低报价即为每个在该买家组中的获胜者所需支付价,其中,所述定价卖家即为定价而牺牲掉的报价最低的一个买家。In the final pricing step, for each winning buyer group, except the pricing buyers, all other buyers are winners; A price to be paid, wherein the pricing seller is the buyer with the lowest price sacrificed for pricing. 2.根据权利要求1所述的保护隐私的异质频谱分配方法,其特征在于,所述拍卖者为计算服务器,所述拍卖代理为协助服务器,所述买家为多台客户端主机。2 . The privacy-preserving heterogeneous spectrum allocation method according to claim 1 , wherein the auctioneer is a computing server, the auction agent is an assisting server, and the buyer is a plurality of client hosts. 3 .
CN201710045759.5A 2017-01-20 2017-01-20 Heterogeneous spectrum allocation method for protecting privacy Expired - Fee Related CN106714183B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710045759.5A CN106714183B (en) 2017-01-20 2017-01-20 Heterogeneous spectrum allocation method for protecting privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710045759.5A CN106714183B (en) 2017-01-20 2017-01-20 Heterogeneous spectrum allocation method for protecting privacy

Publications (2)

Publication Number Publication Date
CN106714183A CN106714183A (en) 2017-05-24
CN106714183B true CN106714183B (en) 2020-05-15

Family

ID=58909463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710045759.5A Expired - Fee Related CN106714183B (en) 2017-01-20 2017-01-20 Heterogeneous spectrum allocation method for protecting privacy

Country Status (1)

Country Link
CN (1) CN106714183B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241806B (en) * 2017-07-14 2018-07-31 安徽大学 Auction and privacy protection based bidirectional heterogeneous spectrum allocation method
CN109033865B (en) * 2018-06-20 2021-10-01 苏州大学 A Privacy-Preserving Task Assignment Method in Spatial Crowdsourcing
CN109756981B (en) * 2019-01-22 2023-10-13 北京电子工程总体研究所 Battlefield wireless spectrum resource allocation method and system based on auction mechanism
CN110460440B (en) * 2019-08-23 2021-12-07 安徽大学 Dynamic virtual machine allocation method based on combined cloud auction mechanism and privacy protection
CN111954220B (en) * 2020-08-21 2022-09-30 安徽大学 One-way heterogeneous spectrum allocation method based on differential privacy protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468986A (en) * 2015-12-02 2016-04-06 深圳大学 Confidential information retrieval method and system
CN105577257A (en) * 2014-10-31 2016-05-11 天工方案公司 Diversity Receiver Front End System With Impedance Matching Components

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577257A (en) * 2014-10-31 2016-05-11 天工方案公司 Diversity Receiver Front End System With Impedance Matching Components
CN105468986A (en) * 2015-12-02 2016-04-06 深圳大学 Confidential information retrieval method and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A Privacy Preserving Truthful Spectrum Auction Scheme using Homomorphic Encryption;Xiaoyan Wang等;《IEEE》;20151231;第I-III节 *
A Proof of Security of Yao’s Protocol for Two-Party Computation;Yehuda Lindell等;《Journal of CRYPTOLOGY》;20081231;第170-174页 *
TAMES: A Truthful Auction Mechanism for Heterogeneous Spectrum Allocation;Yanjiao Chen等;《IEEE》;20131231;全文 *
面向车载自组网的高效位置隐私保护查询方案;郭松矗等;《计算机工程》;20140630;第40卷(第6期);全文 *

Also Published As

Publication number Publication date
CN106714183A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN106714183B (en) Heterogeneous spectrum allocation method for protecting privacy
CN107392743B (en) McAfe two-way auction privacy protection method and auction method
Choi et al. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
CN106161405B (en) Privacy protectable information based on Homomorphic Encryption Scheme calculates safely implementation method
WO2001011448A2 (en) Privacy preserving negotiation and computation
JP2019061233A (en) System and method for secure two-party assessment of the utility of sharing data
Wang et al. Privacy-preserving and truthful double auction for heterogeneous spectrum
CN107241806B (en) Auction and privacy protection based bidirectional heterogeneous spectrum allocation method
Chen et al. ARMOR: A secure combinatorial auction for heterogeneous spectrum
Sun et al. Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets
CN109345331A (en) A Task Assignment Method for Crowd Sensing System with Privacy Protection
CN111586142A (en) Safe multi-party computing method and system
Devidas et al. Identity verifiable ring signature scheme for privacy protection in blockchain
Guo et al. Secure first-price sealed-bid auction scheme
Chen et al. Secure, efficient and practical double spectrum auction
Li et al. Secure multi‐unit sealed first‐price auction mechanisms
Chen et al. Privacy-preserving spectrum auction design: challenges, solutions, and research directions
JP2008020871A (en) Secret sharing information processing system
CN109362076A (en) A dynamic spectrum allocation method with privacy-preserving properties
Wang et al. Quantum sealed-bid auction protocol based on quantum secret sharing.
Wang et al. Secure double auction protocols with full privacy protection
Liu et al. Multiparty Sealed-Bid auction protocol based on the correlation of Four-Particle entangled state
Xu et al. Privacy-preserving double auction mechanism based on homomorphic encryption and sorting networks
Omote et al. An anonymous sealed-bid auction with a feature of entertainment
Bogetoft et al. Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200515

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载