{"id":"https://openalex.org/W4414155244","doi":"https://doi.org/10.1109/jiot.2025.3605945","title":"GTMPC: A Secure Multiparty Computation Scheme for IIoT Data Based on Game Theory","display_name":"GTMPC: A Secure Multiparty Computation Scheme for IIoT Data Based on Game Theory","publication_year":2025,"publication_date":"2025-09-11","ids":{"openalex":"https://openalex.org/W4414155244","doi":"https://doi.org/10.1109/jiot.2025.3605945"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3605945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3605945","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025619157","display_name":"Yang Zhang","orcid":"https://orcid.org/0000-0003-1217-3876"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-1217-3876","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091752280","display_name":"Chuanhua Wang","orcid":"https://orcid.org/0000-0003-0465-6536"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chuanhua Wang","raw_affiliation_strings":["School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0465-6536","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084386606","display_name":"Xin Xu","orcid":"https://orcid.org/0000-0002-9506-0887"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xu","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-9506-0887","affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406666","display_name":"Quan Zhang","orcid":"https://orcid.org/0000-0001-7778-4243"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quan Zhang","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089406153","display_name":"Yingbiao Yao","orcid":"https://orcid.org/0000-0001-7946-6070"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingbiao Yao","raw_affiliation_strings":["School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7946-6070","affiliations":[{"raw_affiliation_string":"School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5025619157"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26727035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"22","first_page":"48277","last_page":"48290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.5996000170707703,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.5996000170707703,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5615000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.4936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.8044999837875366},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5726000070571899},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5026999711990356},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.4860999882221222},{"id":"https://openalex.org/keywords/backward-induction","display_name":"Backward induction","score":0.43050000071525574},{"id":"https://openalex.org/keywords/computation-offloading","display_name":"Computation offloading","score":0.38429999351501465},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.38359999656677246},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3815000057220459},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.37459999322891235},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3741999864578247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483999967575073},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.8044999837875366},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5726000070571899},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5026999711990356},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.4860999882221222},{"id":"https://openalex.org/C160343169","wikidata":"https://www.wikidata.org/wiki/Q968642","display_name":"Backward induction","level":3,"score":0.43050000071525574},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4230000078678131},{"id":"https://openalex.org/C2781041963","wikidata":"https://www.wikidata.org/wiki/Q18348618","display_name":"Computation offloading","level":4,"score":0.38429999351501465},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.38359999656677246},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3815000057220459},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.37459999322891235},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3741999864578247},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.36629998683929443},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.36390000581741333},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.359499990940094},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.35690000653266907},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.33959999680519104},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.33340001106262207},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.3197000026702881},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.31790000200271606},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3138999938964844},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.31209999322891235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3077000081539154},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.30660000443458557},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2964000105857849},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2912999987602234},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.27810001373291016},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C2778079155","wikidata":"https://www.wikidata.org/wiki/Q288500","display_name":"Potential game","level":3,"score":0.260699987411499},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C32407928","wikidata":"https://www.wikidata.org/wiki/Q2733833","display_name":"Best response","level":3,"score":0.2599000036716461},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3605945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3605945","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121904217","display_name":null,"funder_award_id":"62301204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4359589439","display_name":null,"funder_award_id":"No. 62301204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7967423569","display_name":null,"funder_award_id":"LGG19F020014","funder_id":"https://openalex.org/F4320322866","funder_display_name":"Natural Science Foundation of Hainan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322866","display_name":"Natural Science Foundation of Hainan Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W3048613926","https://openalex.org/W3048795031","https://openalex.org/W3049033023","https://openalex.org/W3089096050","https://openalex.org/W3119569744","https://openalex.org/W3120444619","https://openalex.org/W3171954485","https://openalex.org/W3190161635","https://openalex.org/W4205788220","https://openalex.org/W4213413389","https://openalex.org/W4226227702","https://openalex.org/W4285110155","https://openalex.org/W4285199955","https://openalex.org/W4285227595","https://openalex.org/W4285239891","https://openalex.org/W4293733467","https://openalex.org/W4306174826","https://openalex.org/W4310049404","https://openalex.org/W4324007072","https://openalex.org/W4324007147","https://openalex.org/W4386275757","https://openalex.org/W4388857041","https://openalex.org/W4395097672","https://openalex.org/W4399447426","https://openalex.org/W4401020935","https://openalex.org/W4405937269"],"related_works":["https://openalex.org/W2083701517","https://openalex.org/W2082804893","https://openalex.org/W2382527959","https://openalex.org/W87038205","https://openalex.org/W2539281752","https://openalex.org/W2550686250","https://openalex.org/W2069340834","https://openalex.org/W2166322483","https://openalex.org/W2125679084","https://openalex.org/W2076840701"],"abstract_inverted_index":{"Data":[0,74],"sharing":[1,24,56,86,130,194],"in":[2,171,220],"the":[3,44,53,91,111,124,138,143,158,172,183,190,201,207,213,224,228],"Industrial":[4],"Internet":[5],"of":[6,46,55,128],"Things":[7],"(IIoT)":[8],"can":[9,30,103,230],"increase":[10],"productivity":[11],"and":[12,52,82,87,117,133,149,156,188,196,218,227],"reduce":[13],"costs,":[14],"but":[15],"it":[16,41],"is":[17,166,216],"critical":[18],"to":[19,162,200],"ensure":[20],"data":[21,36,57,85,129,193],"security":[22,32],"while":[23],"data.":[25],"Secure":[26],"multi-party":[27,118],"computation":[28],"(MPC)":[29],"address":[31,60],"problems":[33],"such":[34],"as":[35,152],"leakage":[37],"during":[38],"computation.":[39],"However,":[40],"still":[42],"faces":[43],"risk":[45],"malicious":[47,105],"behavior":[48,106],"from":[49,107],"internal":[50],"participants":[51],"problem":[54],"decision-making.":[58],"To":[59],"these":[61],"problems,":[62],"we":[63,77,97,122,141,175],"propose":[64,98,177],"a":[65,79,153,167],"Game":[66],"Theory-based":[67],"secure":[68],"Multi-Party":[69],"Computation":[70],"scheme":[71,195],"for":[72,90],"IIoT":[73,92],"(GTMPC).":[75],"Firstly,":[76],"design":[78],"traceable,":[80],"verifiable":[81],"auditable":[83],"industrial":[84,192],"computing":[88,134,150],"framework":[89],"based":[93,181],"on":[94,137,182],"blockchain.":[95],"Then,":[96],"an":[99,178],"MPC":[100,144],"protocol":[101],"that":[102,164,212],"resist":[104],"participants.":[108],"It":[109],"obtains":[110],"voting":[112,115],"results":[113,198,210],"through":[114],"identifiers":[116],"multiplication.":[119],"More":[120],"importantly,":[121],"establish":[123],"revenue":[125,229],"optimization":[126],"models":[127],"between":[131,147],"consumers":[132,148],"devices.":[135],"Based":[136],"above":[139],"models,":[140],"model":[142],"interaction-sharing":[145],"process":[146],"devices":[151],"Stackelberg":[154,169],"game,":[155],"use":[157],"backward":[159],"induction":[160],"method":[161],"prove":[163],"there":[165],"unique":[168],"Equilibrium":[170],"game.":[173],"Furthermore,":[174],"also":[176],"MPC-solving":[179],"algorithm":[180,215],"Steepest":[184],"Descent":[185],"Method":[186],"(MPC_SDM),":[187],"obtain":[189],"optimal":[191],"calculation":[197],"according":[199],"constantly":[202],"updated":[203],"credit":[204],"score.":[205],"Finally,":[206],"simulation":[208],"experiment":[209],"show":[211],"MPC_SDM":[214],"efficient":[217],"feasible":[219],"IIoT,":[221],"better":[222],"than":[223],"comparison":[225],"algorithm,":[226],"be":[231],"increased":[232],"by":[233],"13.2%.":[234]},"counts_by_year":[],"updated_date":"2025-11-07T23:20:04.922697","created_date":"2025-10-10T00:00:00"}
