Secure distributed constraint satisfaction: reaching agreement without revealing private information

被引:17
|
作者
Yokoo, M
Suzuki, K
Hirayama, K
机构
[1] Kyushu Univ, Fac Informat Sci & Elect Engn, Higashi Ku, Fukuoka 8128581, Japan
[2] NTT Corp, NTT Informat Sharing Platform Labs, Yokosuka, Kanagawa 2390847, Japan
[3] Kobe Univ, Fac Maritime Sci, Higashinada Ku, Kobe, Hyogo 6580022, Japan
关键词
distributed constraint satisfaction; privacy/security; cryptography; homomorphic encryption;
D O I
10.1016/j.artint.2004.10.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper develops a secure distributed constraint satisfaction algorithm. A Distributed Constraint Satisfaction Problem (DisCSP) is a constraint satisfaction problem in which variables and constraints are distributed among multiple agents. A major motivation for solving a DisCSP without gathering all information in one server is the concern about privacy/security. However, existing DisCSP algorithms leak some information during the search process, and privacy/security issues are not dealt with formally. Our newly developed algorithm utilizes a public key encryption scheme. In this algorithm, multiple servers, which receive encrypted information from agents, cooperatively perform a search process that is equivalent to a standard chronological backtracking algorithm. This algorithm does not leak any private information on the obtained solution, i.e., neither agents nor servers can obtain any additional information on the value assignment of variables that belong to other agents. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:229 / 245
页数:17
相关论文
共 8 条
  • [1] Information Theoretically Private and Secure Distributed Voting Without a Trusted Authority
    Najarkolaei, Seyed Reza Hoseini
    Kazempour, Nargess
    Aref, Mohammad Reza
    Gunduz, Deniz
    [J]. 2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 374 - 379
  • [2] Secure distributed agreement protocols for information assurance applications
    Sabbir, A.
    Ravindran, K.
    Kwiat, K. A.
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 890 - +
  • [3] Private Information Retrieval for Secure Distributed Storage Systems
    Yang, Heecheol
    Shin, Wonjae
    Lee, Jungwoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (12) : 2953 - 2964
  • [4] Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information
    Gunlu, Onur
    Schaefer, Rafael F.
    Boche, Holger
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3803 - 3816
  • [6] Secure coprocessor-based private information retrieval without periodical preprocessing
    Wang, Peishun
    Wang, Huaxiong
    Pieprzyk, Josef
    [J]. Conferences in Research and Practice in Information Technology Series, 2010, 105 : 5 - 11
  • [7] Efficient Virtual Network Optimization across Multiple Domains without Revealing Private Information
    Mano, Toru
    Inoue, Takeru
    Ikarashi, Dai
    Hamada, Koki
    Mizutani, Kimihiro
    Akashi, Osamu
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [8] Efficient Virtual Network Optimization Across Multiple Domains Without Revealing Private Information
    Mano, Toru
    Inoue, Takeru
    Ikarashi, Dai
    Hamada, Koki
    Mizutani, Kimihiro
    Akashi, Osamu
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (03): : 477 - 488