2012
DOI: 10.3233/jcs-2012-0452
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient distributed linear programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

3
3

Authors

Journals

citations
Cited by 28 publications
(33 citation statements)
references
References 36 publications
0
33
0
Order By: Relevance
“…Such information disclosure would explicitly compromise the consumers' privacy on the power grid [40,41]. We will explore privacy-preserving schemes [42,43] to effectively formulate and efficiently solve the ECS/GECS problem among multiple agents on the smart grid with limited disclosure [44,45]. Furthermore, we will extend the agent-based ECS problems for appliances to the entities with renewable energy sources [46,47], considering each agent and its appliances as a microgrid (which both consumes and generates electricity).…”
Section: Discussionmentioning
confidence: 99%
“…Such information disclosure would explicitly compromise the consumers' privacy on the power grid [40,41]. We will explore privacy-preserving schemes [42,43] to effectively formulate and efficiently solve the ECS/GECS problem among multiple agents on the smart grid with limited disclosure [44,45]. Furthermore, we will extend the agent-based ECS problems for appliances to the entities with renewable energy sources [46,47], considering each agent and its appliances as a microgrid (which both consumes and generates electricity).…”
Section: Discussionmentioning
confidence: 99%
“…Du [12] and Vaidya [13] transformed the linear programming problem by multiplying a monomial matrix to both the constraint matrix and the objective function, assuming that one party holds the objective function while the other party holds the constraints. Bednarz et al [14,15] pointed out a potential attack to the above transformation approach, which has been resolved in [3,16]. In addition, Mangasarian presented two transformation approaches for horizontally partitioned linear programs [17] and vertically partitioned linear programs [18] respectively.…”
Section: Related Workmentioning
confidence: 99%
“…The reason for this is the high degree of trust required, wherein proprietary data has to be shared with an external party which can then carry out the optimization. To deal with this, privacy-preserving solutions have been developed to enable collaborative optimization for several specific problems [1][2][3][4][5]. In this paper, we focus on the traveling salesman problem (TSP).…”
Section: Introductionmentioning
confidence: 99%
“…Mangasarian [12] uses only the multiplication with P for a system with only equality constraints (2). Hong et al [8] propose a complex set of protocols for a certain kind of distributed linear programming problems. Regarding the security, they prove that these protocols leak no more than what is made public by Bednarz's transformation.…”
Section: Overview Of Proposed Methodsmentioning
confidence: 99%
“…Transformation-based methods have been proposed in [4,3,14,11,12,15,8,2,10,7]. A set of "standard" transformations, applicable to the initial program, have been proposed over the years.…”
Section: Transformation Methodsmentioning
confidence: 99%