CN114117521A - Distributed aggregation game method and system based on network communication homomorphic encryption - Google Patents

Distributed aggregation game method and system based on network communication homomorphic encryption Download PDF

Info

Publication number
CN114117521A
CN114117521A CN202111384487.4A CN202111384487A CN114117521A CN 114117521 A CN114117521 A CN 114117521A CN 202111384487 A CN202111384487 A CN 202111384487A CN 114117521 A CN114117521 A CN 114117521A
Authority
CN
China
Prior art keywords
user node
encryption
decision quantity
user
neighbor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111384487.4A
Other languages
Chinese (zh)
Inventor
白昊民
段文凯
许文盈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN202111384487.4A priority Critical patent/CN114117521A/en
Publication of CN114117521A publication Critical patent/CN114117521A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/04Inference or reasoning models
    • G06N5/042Backward inferencing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to a distributed aggregation game method and a system based on network communication homomorphic encryptioni(0) Auxiliary variable kappai(0) And generating a public and private key pair; at time t, each user node generates a random number a for each neighborij(t) applying a privacy encryption protocol to calculate an encrypted item comprising the difference of the total decision quantity estimate, transmitting kappa to the neighbour via the communication networki(t) and deriving D according to a coherency protocoli(t +1) and κi(t + 1); each user node is further according to Di(t +1) obtaining the decision quantity l at the next momenti(t + 1); finally, each user node judges whether a termination condition is reached or not, and if the termination condition is not reached, a termination strip is obtainedAnd continuing the operation at the next moment until the termination condition is met. According to the invention, the homomorphic encryption algorithm is introduced into the distributed game method, so that the user can not derive the true value according to the transmission value, the data privacy of the user is protected, and the feasibility is improved.

Description

Distributed aggregation game method and system based on network communication homomorphic encryption
Technical Field
The invention relates to a distributed aggregation game method and a distributed aggregation game system based on network communication homomorphic encryption, and belongs to the field of distributed computation and analysis.
Background
Since the cost in many areas depends on the overall decision not known to the end user, it is one of the current areas of research to estimate it using a distributed algorithm based on an average consensus protocol. Through the adjacent communication between users regarding the total decision estimation, a search strategy for nash balance points is developed.
Game theory is an effective modeling and analysis tool that deals with interactions between consumers in many areas. The Stackelberg game, evolutionary game, differential game and other game theory methods have been widely used for designing and analyzing demand response schemes in many fields, such as: smart grid, financial economy, wireless sensor network, and the like. Of which the most important is nash equilibrium, which refers to a combination of policies of participants, on which any participant alone changes the policy without making his own profit bigger. In other words, a policy combination is a nash equilibrium if, on a policy combination, nobody changes its own policy when all others do not.
In order to solve the problems that the central node of the centralized algorithm has overlarge calculation pressure and a single node cannot acquire global information, a more efficient and stable distributed calculation method is rapidly developed. Distributed computing refers to sharing information between two or more pieces of software, which may run on the same computer or on multiple computers connected by a network. Sharing scarce resources and balancing load are one of the core ideas of distributed computing. The method has the advantages of high reliability, high fault tolerance, high calculation speed, high openness and the like. But the security and privacy protection is poor.
At present, distributed algorithms based on average consensus protocols are mature, but the algorithms basically ignore the protection of the privacy of users. That is, to achieve agreement, existing consensus algorithms require each user to exchange explicit state information with its neighbors. This results in the disclosure of private information, which is undesirable in situations involving privacy. Just because the existing consistency algorithm neglects protection of the private information of the user, the feasibility of practical application is not high.
Disclosure of Invention
The purpose of the invention is as follows: the invention provides a distributed aggregation game method and a distributed aggregation game system based on network communication homomorphic encryption, which aim to solve the technical problem that the privacy protection is poorer by the existing distributed consistency algorithm based on network communication, and finally achieve the aims of achieving a consistency agreement and achieving a Nash equilibrium point by the system under the condition that the individual privacy is not disclosed by a user.
The technical scheme is as follows: in order to achieve the purpose, the invention adopts the following technical scheme:
a distributed aggregation gaming method based on network communication homomorphic encryption comprises the following steps:
(1) each user node i in the initial time network determines the relation between the estimation of the total decision quantity and the decision quantity of the user node i according to the cost function, and initializes the estimation D of the total decision quantityi(0) Auxiliary variable kappai(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
(2) at time t each user node i generates a random number a for each neighbor node jij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijInformation including a difference between the user node and a neighboring node with respect to the total decision quantity estimation;
(3) each user node i transmits k to the neighbors through the communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable κi(t + 1); wherein the auxiliary variable κi(t +1) summarizing the delta x of all the neighbor nodes of the user node iij
(4) Each user node i according to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) each user node i judges whether the termination condition is met, if the termination condition is not met, the step (2) is continuously operated until the termination condition is met.
Preferably, in the step (1), the communication network structure is represented by a connectionless graph, and the pairwise neighbor relationship is determined according to the position relationship between the user nodes.
Preferably, the relationship between the estimation of the total decision quantity and the self decision quantity is expressed as:
li(t)=-βiDi(t)+γi
wherein beta isi、γiAre coefficients related to a cost function.
Preferably, in the step (2), each user node i generates its own public key and private key pair according to the following steps
Figure BDA0003363112420000021
i. User node i selects two prime numbers p with the same byte lengthi,
Figure BDA0003363112420000022
And calculate ni=piqi
Let λi=φ(ni)=(pi-1)(qi-1), where Φ (·) is an euler function;
let ui=φ(ni)-1mod niI.e. muiIs phi (n)i) Is the inverse of the modulo multiplication ofi*φ(ni)=1modni
Obtaining a public key
Figure BDA0003363112420000023
Private key
Figure BDA0003363112420000024
Preferably, the privacy encryption protocol in the step (2) adopts a paillier encryption algorithm.
Preferably, in the step (2), a privacy encryption protocol is used to exchange information through a communication network, and each user node i obtains Δ x of each neighbor node jijConcretely speaking, pressThe method comprises the following steps:
i. user nodes i, j use their own public keys to respective Di(t),Dj(t) encrypting to obtain epsiloni(Di(t)),εj(Dj(t)); ε represents the encryption operation;
ii, respectively transmitting the encrypted values and the public key to the opposite side, and obtaining epsilon by the user node ij(Dj(t)) and
Figure BDA0003363112420000025
user node j gets εi(Di(t)) and
Figure BDA0003363112420000031
iii, the user nodes i and j respectively use the public keys of the opposite sides to encrypt the negative values of the user nodes to obtain epsilonj(-Di(t)) and εi(-Dj(t));
iv, multiplying the two values by the user nodes i, j respectively, and obtaining epsilon according to the property of the public keyj(Dj(t)-Di(t)),εi(Di(t)-Dj(t));
v. user nodes i, j respectively make the values obtained in the previous step into power aij(t) and aji(t), deriving ε by public key propertiesj(aij(t)(Dj(t)-Di(t))) and εi(aji(t)(Di(t)-Dj(t)));aij(t) and aji(t) is a random number;
vi, the user node i, j returns the value obtained in the previous step to the opposite side;
user nodes i, j decrypt the received values using their own keys and multiply the weights a, respectivelyij(t) and aji(t), final results were obtained: Δ xij=aij(t)aji(t)(Di(t)-Dj(t)) and Δ xji=aji(t)aij(t)(Dj(t)-Di(t))。
Preferably, in the step (3), the estimation of the total decision quantity is updated according to the following formula:
Figure BDA0003363112420000032
where N is the total number of user nodes in the communication network,
Figure BDA0003363112420000033
a neighbor set of a user node i is defined, and epsilon is a step length;
the auxiliary variable is updated according to the following formula:
Figure BDA0003363112420000034
preferably, the iteration termination condition in step (5) is expressed as:
|Di(t+1)-Di(t)|<10-3
i(t+1)-κi(t)|<10-5
if the user node i simultaneously satisfies the above two conditions, the iteration is terminated, Dii,liRemain unchanged.
Based on the same inventive concept, the invention provides a distributed aggregation game system based on network communication homomorphic encryption, wherein each user node participating in decision in a communication network is provided with the following modules:
an initialization module used for the user node i at the initial moment to determine the relation between the estimation of the total decision quantity and the decision quantity of the user node i according to the cost function and initialize the estimation D of the total decision quantityi(0) Auxiliary variable kappai(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
a privacy encryption module for generating a random number a for each neighbor node j at a time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijIncluding the total decision between the user node and the neighbor nodeInformation of the difference of the quantity estimates;
information transmission and update module for user node i to transmit k to neighbor through communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable κi(t + 1); wherein the auxiliary variable κi(t +1) summarizing the delta x of all the neighbor nodes of the user node iij(ii) a And according to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
And the control module is used for calling the privacy encryption module at each moment t and making a decision by the information transmission and updating module until a termination condition is reached.
Based on the same inventive concept, the invention provides a distributed aggregation gaming system based on network communication homomorphic encryption, wherein each user node participating in decision in a communication network comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, and the computer program realizes the following method steps when being loaded on the processor:
(1) determining the relation between the estimation of the total decision quantity and the decision quantity of the user according to the cost function at the initial moment, and initializing the estimation D of the total decision quantityi(0) Auxiliary variable kappai(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
(2) generating a random number a for each bit neighbor node j at time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijInformation including a difference between the user node and a neighboring node with respect to the total decision quantity estimation;
(3) transmission of k to neighbors over communication networksi(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable κi(t + 1); wherein the auxiliary variable κi(t +1) summarizing the delta x of all the neighbor nodes of the user node iij
(4) According to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) judging whether the termination condition is reached, if not, continuing to operate the step (2) until the termination condition is met.
Has the advantages that: compared with the prior art, the invention has the beneficial effects that: 1. the invention provides a distributed aggregation game method based on a consistency protocol, which can efficiently reach the Nash equilibrium point of a system and optimize the decision of each user. 2. In the process of reaching the Nash equilibrium point based on the communication network, the privacy of each user is effectively protected by applying the homomorphic encryption algorithm, namely the decision quantity of a neighbor can not be calculated by the value obtained by communication of each user, and the actual application value of the distributed aggregation game is improved.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the present invention.
Fig. 2 is a network topology diagram constructed in an example of the present invention.
Fig. 3 is a flowchart of a homomorphic encryption algorithm in an embodiment of the present invention.
Detailed Description
The invention is further described with reference to the drawings and examples.
As shown in fig. 1, a distributed aggregation gaming method based on network communication homomorphic encryption disclosed in the embodiment of the present invention includes the following specific steps:
(1) at the initial moment, each user node i in the network obtains the relation between the total decision quantity and the self decision quantity according to the self cost function, and initializes the estimation D of the total decision quantityi(0) Auxiliary variable kappai(0) Neighbor set
Figure BDA0003363112420000051
Calculating to obtain self decision quantity li(0) And public and private key pair
Figure BDA0003363112420000052
Initializing an initial iteration round number t which is 0 and taking a step length epsilon;
(2) each user section at time tThe point i generates a random number a for each bit of neighbor node jij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij
(3) Each user node i transmits k to the neighbors through the communication networki(t) and deriving D according to a coherency protocoli(t +1) and κi(t+1);
(4) Each user node i according to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) each user node i judges whether the termination condition is met, if the termination condition is not met, the step (2) is continuously operated until the termination condition is met.
In specific implementation, the communication network structure is represented by a non-directional connected graph in the step (1), the total number of user nodes participating in decision making is N, and the pairwise neighbor relation is determined according to the position relation between users. The relationship between the estimation of the total decision amount and the self decision amount by the user node is determined according to a specific application scenario, and the embodiment takes the decision of the power consumption in a Heating Ventilation and Air Conditioning (Heating Ventilation and Air Conditioning) system as an example for explanation.
The step (1) specifically comprises the following steps:
(a) each user node i determines a cost function according to the condition of the user node i, wherein in the example:
Figure BDA0003363112420000053
wherein
Figure BDA0003363112420000054
Representing cost functions in HVAC systems, dependent on their power usage liAnd the actual total power consumption
Figure BDA0003363112420000055
(i.e., the total amount of decisions that this embodiment needs to estimate), viiWhich represents the coefficient of heat transfer,
Figure BDA0003363112420000056
is vitamin A toThe amount of power required to maintain the desired temperature; c may be referred to as a price coefficient (representing the conversion of the calculation unit to the actual unit), p0Representing the lowest unit price (the formula l can be put forward)iCoefficient of
Figure BDA0003363112420000057
Is monovalent); v. ofii,c,
Figure BDA0003363112420000058
poAre all constant and
Figure BDA0003363112420000059
c>0。
(b) the step size epsilon is determined according to the desired iteration speed,
Figure BDA00033631124200000510
wherein
Figure BDA00033631124200000511
The convergence of algorithm iteration can be ensured by the values, and the more accurate range is
Figure BDA00033631124200000512
(c) Each user node initializes an estimate D of the total decision quantityi(0) Auxiliary variable kappai(0) And neighbor set
Figure BDA00033631124200000513
Whether Di(0) How the value is taken, the algorithm converges through enough iteration rounds, but if D isi(0) With a large difference from the sum of the true values or D between usersi(0) The number of iteration rounds of algorithm convergence is larger when the difference is larger. Usually kappai(0) Take 0.
(d) Each user node generates its own public key and private key pair
Figure BDA0003363112420000061
The method specifically comprises the following steps:
i. the user node i selects two sufficiently large prime numbers p of the same byte lengthi,
Figure BDA0003363112420000062
And calculate ni=piqi
Let λi=φ(ni)=(pi-1)(qi-1), where φ (·) is an Euler function.
Let ui=φ(ni)-1modniI.e. muiIs phi (n)i) Is the inverse of the modulo multiplication ofi*φ(ni)=1modni
Obtaining a public key
Figure BDA0003363112420000063
Private key
Figure BDA0003363112420000064
(e) Each user node i gets l by bringing t to 0 according to formula (i)i(0):
li(t)=-βiDi(t)+γi (Ι)
In the step (2), the privacy encryption protocol adopts a paillier encryption algorithm, which specifically comprises the following steps:
(a) each user node i to each neighbor
Figure BDA0003363112420000065
Random generation of aij(t) in which
Figure BDA0003363112420000066
(b) Private encryption protocol-encryption
Figure BDA0003363112420000067
The method specifically comprises the following steps:
i. definition of
Figure BDA0003363112420000068
Wherein gcd (a, b) represents the greatest common divisor of a and b, and n is a public key.
ii, optionally taking
Figure BDA0003363112420000069
iii. ciphertext c ═ (n +1)mrnmod n2Wherein
Figure BDA00033631124200000610
(c) Private encryption protocol-decryption
Figure BDA00033631124200000611
The method specifically comprises the following steps:
i. defining a real decomposition function
Figure BDA00033631124200000612
Plain text m ═ L (c)λmod n2) μ mod n, (λ, μ) is the private key.
(d) Information is exchanged via the communication network using a privacy encryption protocol, and each user node i obtains each neighbor
Figure BDA00033631124200000613
Δ x ofijAs shown in fig. 3, the user node i and the user node j specifically perform the following steps:
i. user nodes i, j use their own public keys to respective Di(t),Dj(t) encrypting to obtain epsiloni(Di(t)),εj(Dj(t));
ii, respectively transmitting the encrypted values and the public key to the opposite side, and obtaining epsilon by the user node ij(Dj(t)) and
Figure BDA00033631124200000614
user node j gets εi(Di(t)) and
Figure BDA00033631124200000615
iii, the user nodes i and j respectively use the public keys of the opposite sides to encrypt the negative values of the user nodes to obtain epsilonj(-Di(t)) and εi(-Dj(t));
iv, multiplying the two values by the user nodes i, j respectively, and obtaining epsilon according to the property of the public keyj(Dj(t)-Di(t)),εi(Di(t)-Dj(t));
v. user nodes i, j respectively make the values obtained in the previous step into power aij(t) and aji(t), deriving ε by public key propertiesj(aij(t)(Dj(t)-Di(t))) and εi(aji(t)(Di(t)-Dj(t)));
vi, the user node i, j returns the value obtained in the previous step to the opposite side;
user nodes i, j decrypt the received values using their own keys and multiply the weights a, respectivelyij(t) and aji(t) obtaining the final result
Δxij=aij(t)aji(t)(Di(t)-Dj(t)) and Δ xji=aji(t)aij(t)(Dj(t)-Di(t))
In the step (3), the method specifically comprises the following steps:
(a) each user node transmits k to neighbors through a communication networki(t) each user node receives k of the neighbor transmissionj(t),
Figure BDA0003363112420000071
(b) And each user node I updates the estimation of the total decision quantity according to the formula (I):
Figure BDA0003363112420000072
(c) and each user node i updates the auxiliary variable according to the formula (I):
Figure BDA0003363112420000073
in step (4), each user node i updates the estimate of the total decision quantity according to equation (IV).
li(t+1)=-βiDi(t+1)+γi (IV)
In step (5), each user node i judges iteration termination conditions (V) and (VI)
|Di(t+1)-Di(t)|<10-3 (V)
i(t+1)-κi(t)|<10-5 (VI)
If user node i satisfies (V) and (VI), the iteration terminates, Dii,liRemain unchanged.
And if the user node i does not satisfy the (V) or (VI), performing the next iteration, and adding one to the iteration time t.
The following describes in detail a specific iterative process of each user node in the embodiment of the present invention by taking the network topology shown in fig. 2 as an example. In this example, the total number N of user nodes participating in the decision is 6. The specific process is as follows:
(1) each user node initializes a cost function according to the condition of the user node
Figure BDA0003363112420000081
βiiEstimate of the total decision quantity Di(0) Auxiliary variable kappai(0) Neighbor set
Figure BDA0003363112420000082
Calculated to obtain li(0) And public and private key pair
Figure BDA0003363112420000083
Initializing an initial iteration round number t which is 0 and taking a step length epsilon; in this example, c is 1, p0=1。
Table 1 initialization environment data
Figure BDA0003363112420000084
Determining the step size according to the desired iteration speed
Figure BDA0003363112420000085
Wherein
Figure BDA0003363112420000086
Each user node generates its own public key and private key pair
Figure BDA0003363112420000087
In this example, p and q are selected within the range [0,2 ]20]Meanwhile, each user node i gets l by bringing t to 0 according to formula (i)i(0)。
Table 2 selection results
Figure BDA0003363112420000088
(2) Each user node generates a random number a for each neighborij(t), calculating to obtain delta x by applying privacy encryption protocolij
Each user node i to each neighbor
Figure BDA0003363112420000089
Random generation of aij(t) in which
Figure BDA00033631124200000810
In this example geta=0.9,
Figure BDA00033631124200000811
An initial random matrix A (t), wherein Aij(t)=aij(t)*aji(t)。
TABLE 3 initial random matrix
0 1.0065 0.8980 0 0 0
1.0065 0 1.1205 0 0 0
1.1068 1.1205 0 1.0334 0.8592 0.9012
0 0 1.0334 0 0.9168 0
0 0 0.8592 0.9168 0 0
0 0 0.9012 0 0 0
(3) Each user node transmits k to neighbors through a communication networki(t), updating the estimation of the total decision quantity according to the formula (I), and updating the auxiliary variable according to the formula (I):
TABLE 4 results of the three rounds of updating
Figure BDA0003363112420000091
(4) Each user node is according to Di(t +1) obtaining the decision quantity l at the next momenti(t +1), the update results are as above.
(5) And (3) each user node judges whether the termination condition is met, if the termination condition is not met, the step (2) is continuously operated until the termination conditions (V) and (VI) are met.
TABLE 5 results of iterative examination
Figure BDA0003363112420000092
Figure BDA0003363112420000101
And the first round and the second round of iteration do not meet the convergence condition, so each user node continues iteration, and the number t of the iteration rounds is increased by one.
In this example, the final convergence round number t is 2685. In this example, the decision quantity is small, Di(0) The value range is [240,300 ]]. If the decision quantity is large in value in practical application, the value range of p and q in the public and private keys is increased.
Based on the same inventive concept, the embodiment of the invention provides a distributed aggregation game system based on network communication homomorphic encryption, wherein each user node participating in decision in a communication network is provided with the following modules: an initialization module used for the user node i at the initial moment to determine the relation between the estimation of the total decision quantity and the decision quantity of the user node i according to the cost function and initialize the estimation D of the total decision quantityi(0) Auxiliary variable kappai(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair; a privacy encryption module for generating a random number a for each neighbor node j at a time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a Information transmission and update module for user node i to transmit k to neighbor through communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable κi(t + 1); and according to Di(t +1) obtaining the decision quantity l at the next momenti(t + 1); and the control module is used for calling the privacy encryption module at each moment t and making a decision by the information transmission and updating module until a termination condition is reached. For details of the implementation of each module, reference is made to the above method embodiments, which are not described herein again.
Based on the same inventive concept, an embodiment of the present invention provides a distributed aggregation gaming system based on network communication homomorphic encryption, in which each user node participating in a decision in a communication network includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the computer program is loaded into the processor, the computer program implements the following method steps:
(1) determining the relation between the estimation of the total decision quantity and the decision quantity of the user according to the cost function at the initial moment, and initializing the estimation of the total decision quantityDi(0) Auxiliary variable kappai(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
(2) generating a random number a for each bit neighbor node j at time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij
(3) Transmission of k to neighbors over communication networksi(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable κi(t+1);
(4) According to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) judging whether the termination condition is reached, if not, continuing to operate the step (2) until the termination condition is met.
For details of the implementation of each step, reference is made to the above method embodiments, which are not described herein again.

Claims (10)

1. A distributed aggregation game method based on network communication homomorphic encryption is characterized by comprising the following steps:
(1) each user node i in the initial time network determines the relation between the estimation of the total decision quantity and the decision quantity of the user node i according to the cost function, and initializes the estimation D of the total decision quantityi(0) Auxiliary variable ki(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
(2) at time t each user node i generates a random number a for each neighbor node jij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijInformation including a difference between the user node and a neighboring node with respect to the total decision quantity estimation;
(3) each user node i transmits k to the neighbor through the communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable ki(t + 1); wherein the auxiliary variable ki(t +1) summarizing the delta x of all the neighbor nodes of the user node iij
(4) Each user node i according to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) each user node i judges whether the termination condition is met, if the termination condition is not met, the step (2) is continuously operated until the termination condition is met.
2. The distributed aggregation gaming method based on network communication homomorphic encryption as claimed in claim 1, wherein in the step (1), the communication network structure is represented by an undirected connectivity graph, and pairwise neighbor relations are determined according to the position relations between the user nodes.
3. The distributed aggregation gaming method based on network communication homomorphic encryption, as set forth in claim 1, wherein the relation between the estimation of the total decision quantity and the self decision quantity is expressed as:
li(t)=-βiDi(t)+γi
wherein beta isi、γiAre coefficients related to a cost function.
4. The distributed aggregation gaming method based on network communication homomorphic encryption as claimed in claim 1, wherein in the step (2), each user node i generates its own public key and private key pair according to the following steps
Figure FDA0003363112410000011
i. User node i selects two prime numbers with same byte length
Figure FDA0003363112410000012
And calculate ni=piqi
Let λi=φ(ni)=(pi-1)(qi-1), where Φ (·) is an euler function;
let ui=φ(ni)-1mod niI.e. muiIs phi (n)i) Is the inverse of the modulo multiplication ofi*φ(ni)=1 mod ni
Obtaining a public key
Figure FDA0003363112410000013
Private key
Figure FDA0003363112410000014
5. The distributed aggregation gaming method based on network communication homomorphic encryption according to claim 4, wherein the privacy encryption protocol in the step (2) adopts a paillier encryption algorithm.
6. The distributed aggregation gaming method based on network communication homomorphic encryption of claim 5, wherein in the step (2), information is exchanged via the communication network by using a privacy encryption protocol, and each user node i obtains Δ x of each neighbor node jijThe method specifically comprises the following steps:
i. user nodes i, j use their own public keys to respective Di(t),Dj(t) encrypting to obtain epsiloni(Di(t)),εj(Dj(t)); ε represents the encryption operation;
ii, respectively transmitting the encrypted values and the public key to the opposite side, and obtaining epsilon by the user node ij(Dj(t)) and
Figure FDA0003363112410000021
user node j gets εi(Di(t)) and
Figure FDA0003363112410000022
iii, the user nodes i, j use the public key of the other party to carry out the negative value of the user nodes i, j respectivelyIs encrypted to obtain epsilonj(-Di(t)) and εi(-Dj(t));
iv, multiplying the two values by the user nodes i, j respectively, and obtaining epsilon according to the property of the public keyj(Dj(t)-Di(t)),εi(Di(t)-Dj(t));
v. user nodes i, j respectively make the values obtained in the previous step into power aij(t) and aji(t), deriving ε by public key propertiesj(aij(t)(Dj(t)-Di(t))) and εi(aji(t)(Di(t)-Dj(t)));aij(t) and aji(t) is a random number;
vi, the user node i, j returns the value obtained in the previous step to the opposite side;
user nodes i, j decrypt the received values using their own keys and multiply the weights a, respectivelyij(t) and aji(t), final results were obtained: Δ xij=aij(t)aji(t)(Di(t)-Dj(t)) and Δ xji=aji(t)aij(t)(Dj(t)-Di(t))。
7. The distributed aggregation gaming method based on the homomorphic encryption of network communication according to claim 3, wherein in step (3), the estimation of the total decision quantity is updated according to the following formula:
Figure FDA0003363112410000023
where N is the total number of user nodes in the communication network,
Figure FDA0003363112410000024
a neighbor set of a user node i is defined, and epsilon is a step length;
the auxiliary variable is updated according to the following formula:
Figure FDA0003363112410000025
8. the distributed aggregation gaming method based on the homomorphic encryption of network communication as claimed in claim 1, wherein the iteration termination condition in step (5) is expressed as:
|Di(t+1)-Di(t)|<10-3
i(t+1)-ki(t)|<10-5
if the user node i simultaneously satisfies the above two conditions, the iteration is terminated, Di,ki,liRemain unchanged.
9. A distributed aggregation gaming system based on network communication homomorphic encryption is characterized in that each user node participating in decision-making in a communication network is provided with the following modules:
an initialization module used for the user node i at the initial moment to determine the relation between the estimation of the total decision quantity and the decision quantity of the user node i according to the cost function and initialize the estimation D of the total decision quantityi(0) Auxiliary variable ki(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
a privacy encryption module for generating a random number a for each neighbor node j at a time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijInformation including a difference between the user node and a neighboring node with respect to the total decision quantity estimation;
an information transmission and update module used for transmitting k from the user node i to the neighbor through the communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable ki(t + 1); wherein the auxiliary variable ki(t +1) summarizing the delta x of all the neighbor nodes of the user node iij(ii) a And according to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
And the control module is used for calling the privacy encryption module at each moment t and making a decision by the information transmission and updating module until a termination condition is reached.
10. A distributed aggregate gaming system based on network communication homomorphic encryption, wherein each decision-making user node in a communication network comprises a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program when loaded into the processor implementing the method steps of:
(1) determining the relation between the estimation of the total decision quantity and the decision quantity of the user according to the cost function at the initial moment, and initializing the estimation D of the total decision quantityi(0) Auxiliary variable ki(0) And a neighbor set directly connected with the neighbor set in the communication network, and calculating to obtain a self decision quantity li(0) And a public and private key pair;
(2) generating a random number a for each bit neighbor node j at time tij(t) calculating to obtain an encryption item deltax by applying a privacy encryption protocolij(ii) a The encryption term Δ xijInformation including a difference between the user node and a neighboring node with respect to the total decision quantity estimation;
(3) transmitting k to a neighbor over a communication networki(t) and deriving an estimate D of the total decision quantity at the next time instant according to a consistency protocoli(t +1) and an auxiliary variable ki(t + 1); wherein the auxiliary variable ki(t +1) summarizing the delta x of all the neighbor nodes of the user node iij
(4) According to Di(t +1) obtaining the decision quantity l at the next momenti(t+1);
(5) And (4) judging whether the termination condition is reached, if not, continuing to operate the step (2) until the termination condition is met.
CN202111384487.4A 2021-11-19 2021-11-19 Distributed aggregation game method and system based on network communication homomorphic encryption Pending CN114117521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111384487.4A CN114117521A (en) 2021-11-19 2021-11-19 Distributed aggregation game method and system based on network communication homomorphic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111384487.4A CN114117521A (en) 2021-11-19 2021-11-19 Distributed aggregation game method and system based on network communication homomorphic encryption

Publications (1)

Publication Number Publication Date
CN114117521A true CN114117521A (en) 2022-03-01

Family

ID=80439219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111384487.4A Pending CN114117521A (en) 2021-11-19 2021-11-19 Distributed aggregation game method and system based on network communication homomorphic encryption

Country Status (1)

Country Link
CN (1) CN114117521A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442023A (en) * 2022-08-30 2022-12-06 大连海事大学 Distributed network online optimization method based on homomorphic encryption mechanism

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180260576A1 (en) * 2015-05-13 2018-09-13 Agency For Science, Technology And Research Network system, and methods of encrypting data, decrypting encrypted data in the same
CN111988185A (en) * 2020-08-31 2020-11-24 重庆邮电大学 Multi-step communication distributed optimization method based on Barzilai-Borwein step length
CN113158238A (en) * 2021-03-30 2021-07-23 中国科学院数学与系统科学研究院 Game control-oriented privacy protection method and system and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180260576A1 (en) * 2015-05-13 2018-09-13 Agency For Science, Technology And Research Network system, and methods of encrypting data, decrypting encrypted data in the same
CN111988185A (en) * 2020-08-31 2020-11-24 重庆邮电大学 Multi-step communication distributed optimization method based on Barzilai-Borwein step length
CN113158238A (en) * 2021-03-30 2021-07-23 中国科学院数学与系统科学研究院 Game control-oriented privacy protection method and system and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭建宇;周金和;: "面向ICN的非合作博弈优化缓存策略", 电讯技术, no. 12, 28 December 2019 (2019-12-28) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442023A (en) * 2022-08-30 2022-12-06 大连海事大学 Distributed network online optimization method based on homomorphic encryption mechanism
CN115442023B (en) * 2022-08-30 2024-03-19 大连海事大学 Distributed network online optimization method based on homomorphic encryption mechanism

Similar Documents

Publication Publication Date Title
He et al. Consensus-based data-privacy preserving data aggregation
He et al. Privacy-preserving and low-latency federated learning in edge computing
CN110209994B (en) Matrix decomposition recommendation method based on homomorphic encryption
Yakut et al. Estimating NBC-based recommendations on arbitrarily partitioned data with privacy
Li et al. Efficient privacy-preserving federated learning with unreliable users
Zhao et al. When crowdsensing meets federated learning: Privacy-preserving mobile crowdsensing system
Li et al. Privacy-preserving communication-efficient federated multi-armed bandits
Tjell et al. Privacy preservation in distributed optimization via dual decomposition and ADMM
Chen et al. Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training
Shi et al. A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
Kumar et al. Ternary tree based group key agreement protocol over elliptic curve for dynamic group
CN114117521A (en) Distributed aggregation game method and system based on network communication homomorphic encryption
CN116523074A (en) Dynamic fairness privacy protection federal deep learning method
Gan et al. Partial policy hiding attribute-based encryption in vehicular fog computing
Fan et al. Lightweight privacy and security computing for blockchained federated learning in IoT
Jung et al. PDA: semantically secure time-series data analytics with dynamic user groups
Wang et al. Decentralized nonconvex optimization with guaranteed privacy and accuracy
Farash et al. Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC.
Xiong et al. Decentralized privacy-preserving truth discovery for crowd sensing
CN112713612B (en) Micro-grid leading-following rapid consistency multi-target scheduling privacy protection method
Zhao et al. VFLR: An efficient and privacy-preserving vertical federated framework for logistic regression
Marandi et al. Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics
Cheng et al. Grcol-ppfl: User-based group collaborative federated learning privacy protection framework
Odeyomi Differentially private online federated learning with personalization and fairness
CN113784340B (en) Secret unloading rate optimization method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination