A Collusion Problem and Its Solution
نویسندگان
چکیده
Consider a group of colluders each with certain knowledge such as identity of some other colluders, some cryptographic keys, and some data, possibly multiply encrypted. Two colluders can combine their knowledge if their current knowledge satis es certain condition. Their cryptographic keys can help decrypt each other's encrypted data, expanding their knowledge and revealing more collusion opportunities, and the process of collusion continues. The question we address is whether it is possible for them to uncover a target set of unencrypted data. In this paper we formulate the collusion problem and provide an algorithm that determines whether a collusion problem has a solution and if so, computes one. A solution is a speci c way by which the colluders can uncover the hidden information. The solution generated by our algorithm is generally not one that involves the minimum number of colluders. We show however that to nd such a solution is NP-complete. Complex communications protocols employing cryptographic building blocks are being developed to transfer information among some users and hide from others. The algorithm presented here can be applied to determine whether and how a subset of protocol users can discover during or after the protocol's execution the information that is to be hidden from them. 2 List of Symbols k lowercase \kay" lowercase epsilon uppercase sigma lowercase sigma uppercase delta lowercase delta lowercase rho lowercase lambda uppercase theta lowercase phi (also denotes null set) [ union subset or equal 6 not a subset of or equal to superset or equal 6 not a superset of or equal to 2 in (a set) 62 not in (a set) P summation X uppercase \X" in calligraphy font Y uppercase \Y" in calligraphy font 3
منابع مشابه
A collusion mitigation scheme for reputation systems
Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...
متن کاملAn Algorithm to Compute Collusion Paths
In earlier work we have formulated a collusion problem that determines whether it is possible for a set of colluders to collectively discover a target set of information, starting from their initial knowledge, and have presented a complete solution for a special case of the problem. In this paper we present an algorithm that solves the general case. Given a collusion problem the algorithm deter...
متن کاملHow to Eliminate Collusion in Tenders and Auctions, using Game Theory (Determination of Ceiling and Floor Prices)
Governments and firms in accordance to their duties, obliged to inevitably contracts with Individuals and legal entities, especially in auction and tender process. Since, the law of conducting tenders and auctions is lacking efficiency and has major objection, therefore, this has led to the dissemination and development of areas of corruption in these contracts (through collusion). In this pape...
متن کاملTolling, Collusion and Equilibrium Problems with Equilibrium Constraints
An Equilibrium Problem with an Equilibrium Constraint (EPEC) is a mathematical construct that can be applied to private competition in highway networks. In this paper we consider the problem of finding a Nash Equilibrium in a situation of competition in toll pricing on a network utilising two alternative algorithms. In the first algorithm, we utilise a Gauss Seidel fixed point approach based on...
متن کاملCollusion-Resistant Audio Fingerprinting System in the Modulated Complex Lapped Transform Domain
Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Comput.
دوره 140 شماره
صفحات -
تاریخ انتشار 1998