2002
DOI: 10.1007/3-540-46135-3_26
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
1

Year Published

2003
2003
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(40 citation statements)
references
References 9 publications
0
39
0
1
Order By: Relevance
“…Recent studies on privacy have shown that DisCSPs can be solved with complete privacy, i.e. no data loss by agents besides the result of the search [14,16,22]. However, this level of privacy requires the use of cryptographic and encryption tools which result in a substantial loss in efficiency.…”
Section: Privacy In Afcmentioning
confidence: 99%
“…Recent studies on privacy have shown that DisCSPs can be solved with complete privacy, i.e. no data loss by agents besides the result of the search [14,16,22]. However, this level of privacy requires the use of cryptographic and encryption tools which result in a substantial loss in efficiency.…”
Section: Privacy In Afcmentioning
confidence: 99%
“…This is certainly a limitation compared to other practical implementations without privacy, but the priority in our scheme is to ensure verifiability and privacy (see Section VI-A on page 6). The cryptographic DCSP approach in [5] shares the same limitation while being not fully verifiable and substantially more complex.…”
Section: Results Publicationmentioning
confidence: 99%
“…As privacy is merely a secondary aspect in DCOP (and many schemes in fact leak information [3], [4] or are not verifiable [5]; despite high complexity), we frame our contribution in the context of e-voting, where exact security analyzes with regard to voter anonymity have a longer tradition.…”
Section: A Single Event Scheduling Problemmentioning
confidence: 99%
“…This criteria is widely believed to be valuable and adaptable for large, open, and/or dynamic distributed problems. It is also perceived as an alternative approach to privacy requirements (Silaghi & Faltings, 2002;Wallace & Silaghi, 2004;Yokoo, Suzuki, & Hirayama, 2002;Silaghi & Mitra, 2004).…”
Section: Introductionmentioning
confidence: 99%