Secure Transformation for Multiparty Linear Programming
نویسندگان
چکیده
With the rapid increase in computing, storage and networking resources, data is not only collected and stored, but also collaboratively analyzed. This creates a serious privacy problem which often inhibits the use of the distributed data. In this paper, we focus on the problem of linear programming, which is the most important sub-class of optimization problems. Specifically, distributed linear programming problems allow different companies (even competitors) to collaboratively seek the maximum profit or minimum cost by better utilizing the combination of their limited resources (constraints). However, the constraints and the objective are typically distributed across different companies. Since the constraints generally refer to internal limitations or capacities, and the objective specifies internal costs or value, serious privacy and security problems arise if these are completely disclosed to other companies. The main contribution of this paper is to introduce privacy-preserving distributed linear programming techniques to resolve the above issue for several real-world distributed linear programming problems. We present a transformation based approach that works for arbitrarily partitioned data distributed between multiple parties, and experimentally evaluate our solution.
منابع مشابه
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper we present a privacy-preserving transformation that allows secure outsourcing of the linear program computation in an efficient ma...
متن کاملCertificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, even if all parties executing the secure computation collude. Since the inputs to a secure computation are private, and potentially the outputs are private as well, adding verifiability is in general...
متن کاملSecure Multiparty Linear Programming Using Fixed-Point Arithmetic
Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applications of this model (e.g., supply chain planning) involve private data that the parties cannot reveal to each other. Traditional linear programming methods cannot be used in this case. The problem can be solved using c...
متن کاملLanguages for Secure Multiparty Computation and Towards Strongly Typed Macros
We show that it is feasible and useful to create programming languages with strong security guarantees for secure multiparty computation. We have designed and implemented the Secure Multiparty Computation Language (SMCL), which is a domain-specific programming language for secure multiparty computation. SMCL allows programmers to write programs using secure multiparty computation without expert...
متن کاملA Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection
We propose a method for applying genetic algorithms to confidential data. Genetic algorithms are a well-known tool for finding approximate solutions to various optimization and searching problems. More specifically, we present a secure solution for solving the subset cover problem which is formulated by a binary integer linear programming (BIP) problem (i.e. a linear programming problem, where ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012