{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T11:11:18Z","timestamp":1693480278316},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T00:00:00Z","timestamp":1515715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s12652-017-0669-z","type":"journal-article","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T01:37:51Z","timestamp":1515721071000},"page":"2913-2927","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Rational adversary with flexible utility in secure two-party computation"],"prefix":"10.1007","volume":"10","author":[{"given":"Yilei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shuaifeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Qingtang","family":"Su","sequence":"additional","affiliation":[]},{"given":"Beijing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,12]]},"reference":[{"issue":"5","key":"669_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.14257\/ijgdc.2013.6.5.09","volume":"6","author":"M Al-Roomi","year":"2013","unstructured":"Al-Roomi M, Al-Ebrahim S, Buqrais S, Ahmad I (2013) Cloud computing pricing models: a survey. Int J Grid Distrib Comput 6(5):93\u2013106","journal-title":"Int J Grid Distrib Comput"},{"key":"669_CR2","doi-asserted-by":"crossref","unstructured":"Alwen J, Jonathan K, Ueli M, Vassilis Z (2012) Collusion-preserving computation. In: Advances in Cryptology\u2013CRYPTO 2012, Springer, New York, pp 124\u2013143","DOI":"10.1007\/978-3-642-32009-5_9"},{"key":"669_CR3","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial cryptography and data security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek \u0141 (2014a) Fair two-party computations via bitcoin deposits. In: Financial cryptography and data security. Springer, New York, pp 105\u2013121"},{"key":"669_CR4","doi-asserted-by":"crossref","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014b) Secure multiparty computations on bitcoin. In: 2014 IEEE symposium on security and privacy. IEEE, pp 443\u2013458","DOI":"10.1109\/SP.2014.35"},{"issue":"1","key":"669_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00145-010-9064-z","volume":"24","author":"G Asharov","year":"2011","unstructured":"Asharov G, Lindell Y (2011) Utility dependence in correct and fair rational secret sharing. J Cryptol 24(1):157\u2013202","journal-title":"J Cryptol"},{"key":"669_CR6","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-20465-4_24","volume-title":"Advances in cryptology-EUROCRYPT 2011","author":"G Asharov","year":"2011","unstructured":"Asharov G, Canetti R, Hazay C (2011) Towards a game theoretic view of secure computation. Advances in cryptology-EUROCRYPT 2011. Springer, New York, pp 426\u2013445"},{"issue":"18","key":"669_CR7","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Hussein AB, Putra S, Brij G (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76(18):18451\u201318472","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"669_CR8","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.ipl.2015.09.009","volume":"116","author":"JG Beekman","year":"2016","unstructured":"Beekman JG (2016) A denial of service attack against fair computations using bitcoin deposits. Inf Process Lett 116(2):144\u2013146","journal-title":"Inf Process Lett"},{"key":"669_CR9","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in cryptology-CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov I, Kumaresan R (2014) How to use bitcoin to design fair protocols. In: Advances in cryptology-CRYPTO 2014. Springer, New York, pp 421\u2013439"},{"issue":"12","key":"669_CR10","doi-asserted-by":"publisher","first-page":"5017","DOI":"10.1109\/TIP.2015.2475625","volume":"24","author":"T-H Chan","year":"2015","unstructured":"Chan T-H, Jia K, Gao S, Lu J, Zeng Z, Ma YP (2015) A simple deep learning baseline for image classification? IEEE Trans Image Process 24(12):5017\u20135032","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"669_CR11","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1109\/TIP.2017.2708506","volume":"26","author":"X Chang","year":"2017","unstructured":"Chang X, Ma Z, Lin M, Yang Y, Hauptmann A (2017a) Feature interaction augmented sparse learning for fast kinect motion detection. IEEE Trans Image Process 26(8):3911\u20133920","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"669_CR12","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","volume":"39","author":"X Chang","year":"2017","unstructured":"Chang X, Yu Y-L, Yang Y, Xing EP (2017b) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617\u20131632","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"669_CR13","doi-asserted-by":"crossref","unstructured":"Cleve R(1986) Limits on the security of coin flips when half the processors are faulty. In: Proceedings of the 18th annual ACM symposium on theory of computing, ACM, pp 364\u2013369","DOI":"10.1145\/12130.12168"},{"key":"669_CR14","doi-asserted-by":"crossref","unstructured":"Garay J, Katz J, Maurer U, Tackmann B, Zikas V (2013) Rational protocol design: cryptography against incentive-driven adversaries. In: Foundations of computer science (FOCS), 2013 IEEE 54th annual symposium on, IEEE, pp 648\u2013657","DOI":"10.1109\/FOCS.2013.75"},{"key":"669_CR15","doi-asserted-by":"crossref","unstructured":"Goldreich O (2001) Foundations of cryptography: volume 1, basic tools. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511546891"},{"key":"669_CR16","unstructured":"Goldreich O (2009) Foundations of cryptography: volume 2, basic applications. Cambridge University Press, Cambridge"},{"key":"669_CR17","doi-asserted-by":"crossref","unstructured":"Gordon DS, Carmit H, Katz J, Lindell Y (2008) Complete fairness in secure two-party computation. In: Proceedings of the 40th annual ACM symposium on theory of computing, ACM, pp 413\u2013422","DOI":"10.1145\/1374376.1374436"},{"key":"669_CR18","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11832072_16","volume-title":"Security and cryptography for networks","author":"SD Gordon","year":"2006","unstructured":"Gordon SD, Katz J (2006) Rational secret sharing, revisited. In: Security and cryptography for networks. Springer, New York, pp 229\u2013241"},{"issue":"1","key":"669_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s00145-010-9079-5","volume":"25","author":"DS Gordon","year":"2012","unstructured":"Gordon DS, Katz J (2012) Partial fairness in secure two-party computation. J Cryptol 25(1):14\u201340","journal-title":"J Cryptol"},{"key":"669_CR20","doi-asserted-by":"crossref","unstructured":"Groce A, Katz J (2012) Fair computation with rational players. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 81\u201398","DOI":"10.1007\/978-3-642-29011-4_7"},{"key":"669_CR21","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-31585-5_50","volume-title":"Automata, languages, and programming","author":"A Groce","year":"2012","unstructured":"Groce A, Katz J, Thiruvengadam A, Zikas V (2012) Byzantine agreement with a rational adversary. Automata, languages, and programming. Springer, New York, pp 561\u2013572"},{"issue":"7","key":"669_CR22","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015a) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"669_CR23","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015b) Incremental learning for $$\\nu$$ \u03bd -support vector regression. Neural Netw 67:140\u2013150","journal-title":"Neural Netw"},{"key":"669_CR24","doi-asserted-by":"crossref","unstructured":"Gu B, Sun X, Sheng VS (2017) Structural minimax probability machine. IEEE Trans Neural Netw Learn Syst 28(7):1646","DOI":"10.1109\/TNNLS.2016.2544779"},{"key":"669_CR25","doi-asserted-by":"crossref","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Glob","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"669_CR26","doi-asserted-by":"crossref","unstructured":"Halpern J, Teague V (2004) Rational secret sharing and multiparty computation: extended abstract. In STOC 2004: Proceedings of the 36th annum ACM symposium on theory of computing, New York, ACM, pp 623\u2013632","DOI":"10.1145\/1007352.1007447"},{"key":"669_CR27","first-page":"303","volume-title":"International workshop on security","author":"H Higo","year":"2013","unstructured":"Higo H, Tanaka K, Yasunaga K (2013) Game-theoretic security for bit commitment. International workshop on security. Springer, New York, pp 303\u2013318"},{"issue":"2","key":"669_CR28","first-page":"27","volume":"7","author":"M Ibtihal","year":"2017","unstructured":"Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27\u201340","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"669_CR29","doi-asserted-by":"crossref","unstructured":"Izmalkov S, Micali S, Lepinski M (2005) Rational secure computation and ideal mechanism design. In: Foundations of computer science, 2005. FOCS 2005. 46th Annual IEEE symposium on, IEEE, pp 585\u2013594","DOI":"10.1109\/SFCS.2005.64"},{"key":"669_CR30","unstructured":"Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta BB (2017) Improving the performance of the Needleman\u2013Wunsch algorithm using parallelization and vectorization techniques. Multimed Tool Appl (3):1\u201317"},{"key":"669_CR31","doi-asserted-by":"crossref","unstructured":"Katz J (2007) On achieving the best of both worlds in secure multiparty computation. In Proceedings of the 39th annual ACM symposium on theory of computing, ACM, pp 11\u201320","DOI":"10.1145\/1250790.1250793"},{"key":"669_CR32","doi-asserted-by":"crossref","unstructured":"Kiayias A, Zhou H-S, Zikas V (2016) Fair and robust multi-party computation using a global transaction ledger. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp 705\u2013734","DOI":"10.1007\/978-3-662-49896-5_25"},{"key":"669_CR33","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-78524-8_18","volume-title":"Theory of cryptography","author":"G Kol","year":"2008","unstructured":"Kol G, Naor M (2008) Cryptography and game theory: designing protocols for exchanging information. In: Fifth theory of cryptography. Springer, New York, pp 320\u2013339"},{"key":"669_CR34","doi-asserted-by":"crossref","unstructured":"Komatsubara Tsuyoshi, Manabe Yoshifumi (2016) Game-theoretic security of commitment protocols under a realistic cost model. In Advanced Information Networking and Applications (AINA), 2016 IEEE 30th International Conference on, pages 776\u2013783. IEEE","DOI":"10.1109\/AINA.2016.47"},{"key":"669_CR35","doi-asserted-by":"crossref","unstructured":"Kumaresan R, Bentov I (2014) How to use bitcoin to incentivize correct computations. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, ACM, pp 30\u201341","DOI":"10.1145\/2660267.2660380"},{"issue":"12","key":"669_CR36","doi-asserted-by":"publisher","first-page":"i121","DOI":"10.1093\/bioinformatics\/btu277","volume":"30","author":"MKK Leung","year":"2014","unstructured":"Leung MKK, Xiong YH, Lee LJ, Frey BJ (2014) Deep learning of the tissue-regulated splicing code. Bioinformatics 30(12):i121\u2013i129","journal-title":"Bioinformatics"},{"issue":"6","key":"669_CR37","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Lee PPC, Li J, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. Parallel Distrib Syst IEEE Trans 25(6):1615\u20131625","journal-title":"Parallel Distrib Syst IEEE Trans"},{"issue":"8","key":"669_CR38","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. Parallel Distrib Syst IEEE Trans 25(8):2201\u20132210","journal-title":"Parallel Distrib Syst IEEE Trans"},{"key":"669_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"key":"669_CR40","doi-asserted-by":"crossref","unstructured":"Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2017a) Privacy-preserving outsourced classification in cloud computing. Cluster Comput pp 1\u201310","DOI":"10.1007\/s10586-017-0849-9"},{"key":"669_CR41","doi-asserted-by":"crossref","unstructured":"Li P, Li J, Huang Z, Li T, Gao C-Z, Yiu S-M, Chen K (2017b) Multi-key privacy-preserving deep learning in cloud computing. Future Gen Comput Syst 74(C):76\u201385","DOI":"10.1016\/j.future.2017.02.006"},{"issue":"4","key":"669_CR42","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/TCBB.2014.2377729","volume":"12","author":"M Liang","year":"2015","unstructured":"Liang M, Li Z, Chen T, Zeng J (2015) Integrative data analysis of multi-platform cancer data with a multimodal deep learning approach. IEEE\/ACM Trans Comput Biol Bioinf (TCBB) 12(4):928\u2013937","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf (TCBB)"},{"key":"669_CR43","first-page":"1","volume-title":"Parallel and distributed processing","author":"S Maleka","year":"2008","unstructured":"Maleka S, Shareef A, Rangan CP (2008a) The deterministic protocol for rational secret sharing. Parallel and distributed processing. In: IEEE international symposium on parallel and distributed processing, pp 1\u20137"},{"key":"669_CR44","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-79104-1_24","volume-title":"Information security practice and experience","author":"S Maleka","year":"2008","unstructured":"Maleka S, Shareef A, Rangan CP (2008b) Rational secret sharing with repeated games. Information security practice and experience. Springer, New York, pp 334\u2013346"},{"key":"669_CR45","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-00457-5_4","volume-title":"Theory of cryptography","author":"S Micali","year":"2009","unstructured":"Micali S, Shelat A (2009) Purely rational secret sharing. Theory of cryptography. Springer, New York, pp 54\u201371"},{"key":"669_CR46","first-page":"1","volume-title":"Theory of cryptography","author":"T Moran","year":"2009","unstructured":"Moran T, Naor M, Segev G (2009) An optimally fair coin toss. In: Theory of cryptography. Springer, New York, pp 1\u201318"},{"key":"669_CR47","unstructured":"Moses Jr WK, Rangan CP (2011) Rational secret sharing over an asynchronous broadcast channel with information theoretic security. arXiv preprint arXiv:1112.4033"},{"key":"669_CR48","unstructured":"Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Counsulted"},{"key":"669_CR49","doi-asserted-by":"crossref","unstructured":"Ong SJ, Parkes DC, Rosen A, Vadhan SP (2009) Fairness with an honest minority and a rational majority. In: Theory of cryptography. Springer, pp 36\u201353","DOI":"10.1007\/978-3-642-00457-5_3"},{"key":"669_CR50","volume-title":"A course in game theory","author":"MJ Osborne","year":"1994","unstructured":"Osborne MJ, Rubinstein A (1994) A course in game theory. MIT Press, Cambridge"},{"issue":"2","key":"669_CR51","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Int Technol 16(2):317\u2013323","journal-title":"J Int Technol"},{"key":"669_CR52","doi-asserted-by":"crossref","unstructured":"Ruffing T, Kate A, Schr\u00f6der D (2015) Liar, liar, coins on fire!: penalizing equivocation by loss of bitcoins. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, ACM, pp 219\u2013230","DOI":"10.1145\/2810103.2813686"},{"issue":"2","key":"669_CR53","first-page":"351","volume":"99","author":"Z Ruijin","year":"2016","unstructured":"Ruijin Z, Tan Y, Zhang Q, Fei W, Zheng J, Yuan XUE (2016) Determining image base of firmware files for arm devices. IEICE Trans Inf Syst 99(2):351\u2013359","journal-title":"IEICE Trans Inf Syst"},{"key":"669_CR54","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.ins.2014.10.040","volume":"295","author":"W Xuezhi","year":"2015","unstructured":"Xuezhi W, Ling S, Yu X, Wei F (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295:395\u2013406","journal-title":"Inf Sci"},{"key":"669_CR55","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2017) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tool Appl pp 1\u201324"},{"key":"669_CR56","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.diin.2016.01.002","volume":"16","author":"R Zhu","year":"2016","unstructured":"Zhu R, Tan Y, Zhang Q, Li Y, Zheng J (2016) Determining image base of firmware for arm devices by matching literal pools. Digital Invest 16:19\u201328","journal-title":"Digital Invest"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-017-0669-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0669-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0669-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T16:16:40Z","timestamp":1693412200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-017-0669-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,12]]},"references-count":56,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["669"],"URL":"https:\/\/doi.org\/10.1007\/s12652-017-0669-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,12]]},"assertion":[{"value":"17 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}