Solving linear programs using multiparty computation

T. Toft

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

36 Citaten (Scopus)
3 Downloads (Pure)

Samenvatting

Solving linear programming (LP) problems can be used to solve many different types of problems. Immediate examples include certain types of auctions as well as benchmarking. However, the input data may originate from different, mistrusting sources, which implies the need for a privacy preserving solution. We present a protocol solving this problem using black-box access to secure modulo arithmetic. The solution can be instantiated in various settings: Adversaries may be both active and adaptive, but passive and/or static ones can be employed, e.g. for efficiency reasons. Perfect security can be obtained in the information theoretic setting (up to 1/3 corruptions), while corruption-of-all-but-one is possible in the cryptographic setting. The latter allows a two-party protocol. The solution is based on the well known simplex method. Letting n denote the number of initial variables and m the number of constraints, each pivot requires only O(loglog(m))rounds in which O(m(m+n)) multiplication protocols and O(m+n) comparison protocols are invoked; this is equivalent to the base-algorithm. A constant-rounds variation is also possible, this increases the number of comparisons to O(m2+n) .
Originele taal-2Engels
TitelFinancial Cryptography and Data Security (FC'09)
Plaats van productieBerlin
UitgeverijSpringer
Pagina's90-107
ISBN van geprinte versie978-3-642-03548-7
DOI's
StatusGepubliceerd - 2009

Publicatie series

NaamLecture Notes in Computer Science
Volume5628
ISSN van geprinte versie0302-9743

Vingerafdruk

Duik in de onderzoeksthema's van 'Solving linear programs using multiparty computation'. Samen vormen ze een unieke vingerafdruk.

Citeer dit