{"id":"https://openalex.org/W3048685241","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162946","title":"Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators","display_name":"Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048685241","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162946","mag":"3048685241"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162946","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162946","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100461301","display_name":"Duo Zhang","orcid":"https://orcid.org/0009-0005-5951-0851"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Duo Zhang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, College of Mathematics and Statistics, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, College of Mathematics and Statistics, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Institute of Cryptography and Date Security, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Institute of Cryptography and Date Security, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100737552","display_name":"Linjie Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Linjie Wang","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109192907","display_name":"Sheng Gao","orcid":"https://orcid.org/0000-0002-6090-1965"},"institutions":[{"id":"https://openalex.org/I137867983","display_name":"Central University of Finance and Economics","ror":"https://ror.org/008e3hf02","country_code":"CN","type":"education","lineage":["https://openalex.org/I137867983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Gao","raw_affiliation_strings":["School of Information, Central University of Finance and Economics, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information, Central University of Finance and Economics, Beijing, China","institution_ids":["https://openalex.org/I137867983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, College of Computer Science and Technology, Xi'dian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, College of Computer Science and Technology, Xi'dian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100461301"],"corresponding_institution_ids":["https://openalex.org/I178232147"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09122082,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"1","issue":null,"first_page":"62","last_page":"67"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8608397245407104},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7998538017272949},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.72330641746521},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6427642703056335},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6204062700271606},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6030429601669312},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5106514096260071},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4819867014884949},{"id":"https://openalex.org/keywords/calculator","display_name":"Calculator","score":0.45015662908554077},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4198574721813202},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4048881530761719},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.34424281120300293},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2056630253791809},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15329065918922424}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8608397245407104},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7998538017272949},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.72330641746521},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6427642703056335},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6204062700271606},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6030429601669312},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5106514096260071},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4819867014884949},{"id":"https://openalex.org/C2776836400","wikidata":"https://www.wikidata.org/wiki/Q31087","display_name":"Calculator","level":2,"score":0.45015662908554077},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4198574721813202},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4048881530761719},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34424281120300293},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2056630253791809},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15329065918922424},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162946","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162946","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1488113673","https://openalex.org/W1557386445","https://openalex.org/W1630587103","https://openalex.org/W2005991258","https://openalex.org/W2007769977","https://openalex.org/W2031533839","https://openalex.org/W2093909024","https://openalex.org/W2096549035","https://openalex.org/W2114296561","https://openalex.org/W2131772137","https://openalex.org/W2141420453","https://openalex.org/W2145166073","https://openalex.org/W2151167752","https://openalex.org/W2308297356","https://openalex.org/W2343346041","https://openalex.org/W2620934568","https://openalex.org/W2743636256","https://openalex.org/W2782747886","https://openalex.org/W2795269798"],"related_works":["https://openalex.org/W2009938035","https://openalex.org/W1490606327","https://openalex.org/W2475866497","https://openalex.org/W2561023381","https://openalex.org/W2797548350","https://openalex.org/W2362078318","https://openalex.org/W220219137","https://openalex.org/W4231071852","https://openalex.org/W1888767437","https://openalex.org/W2040300299"],"abstract_inverted_index":{"In":[0,56],"cloud":[1,54],"computing,":[2,188],"the":[3,17,20,31,44,49,53,64,78,81,90,100,103,109,112,118,121,127,136,141,147,151,155,162,166,170,174,179,185,192,195],"delegation":[4,50,187],"computation":[5,87],"service":[6],"is":[7,43,143,159],"required":[8],"because":[9],"end":[10],"users":[11],"usually":[12],"are":[13],"resource-constrained,":[14],"and":[15,33,67,77,99,117,150,154],"at":[16],"same":[18],"time":[19],"correctness":[21],"of":[22,111,138,165,172,181,194],"computing":[23,51,148],"results":[24,167],"needs":[25],"to":[26,40,58,84,92,107,124],"be":[27],"verified.":[28],"However,":[29],"all":[30,132,173],"existing":[32],"available":[34],"technologies":[35],"have":[36],"a":[37,68,94],"high":[38],"cost":[39],"verify":[41],"which":[42],"main":[45],"problem":[46,180],"faced":[47],"by":[48,88,145],"under":[52],"platform.":[55],"order":[57],"address":[59],"this":[60],"issue,":[61],"based":[62],"on":[63],"game":[65],"theory":[66],"smart":[69],"contract,":[70],"we":[71],"construct":[72],"three":[73],"protocols.":[74],"The":[75,97,115],"client":[76,98],"calculator":[79,91,116],"sign":[80,102,120],"Prisoner's":[82],"Protocol":[83,106,123],"incentivize":[85],"correct":[86],"asking":[89],"pay":[93],"deposit":[95],"upfront;":[96],"verifier":[101,119],"Long-acting":[104],"Mechanism":[105],"ensure":[108],"validity":[110],"verification":[113,152,157,182],"results;":[114],"Collusion":[122],"make":[125],"collusion":[126],"most":[128],"profitable":[129],"strategy":[130],"for":[131],"colluding":[133],"parties.":[134],"Through":[135],"combination":[137,171],"these":[139],"protocols,":[140],"work":[142],"realized":[144],"separation":[146],"task":[149,158],"task,":[153],"heavy":[156],"avoided.":[160],"Finally,":[161],"performance":[163],"analysis":[164],"shows":[168],"that":[169],"protocols":[175],"not":[176],"only":[177],"solves":[178],"complexity":[183],"in":[184],"traditional":[186],"but":[189],"also":[190],"guarantees":[191],"benefit":[193],"honest":[196],"player.":[197]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
