Secure distributed constraint satisfaction: reaching agreement without revealing private information

Artificial Intelligence - Tập 161 - Trang 229-245 - 2005
Makoto Yokoo1, Koutarou Suzuki2, Katsutoshi Hirayama3
1Faculty of Information Science and Electrical Engineering, Kyushu University, 6-10-1 Hakozaki, Higashi-ku, Fukuoka 812-8581, Japan
2NTT Information Sharing Platform Laboratories, NTT Corporation, 1-1 Hikari-no-oka, Yokosuka, Kanagawa 239-0847, Japan
3Kobe University, Faculty of Maritime Sciences, 5-1-1 Fukae-minami-machi, Higashinada-ku, Kobe 658-0022, Japan

Tài liệu tham khảo

Ben-Or, 1988, Completeness theorems for non-cryptographic fault-tolerant distributed computation, 1 ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inform. Theory, IT-31, 469, 10.1109/TIT.1985.1057074 Freuder, 2001, Privacy/efficiency tradeoffs in distributed meeting scheduling by constraint-based agents Ghedira, 1992, A multi-agent model for the resource allocation problem: A reactive approach, 252 Goldreich, 1987, How to play any mental game or a completeness theorem for protocols with honest majority, 218 Goldwasser, 1984, Probabilistic encryption, J. Comput. System Sci., 28, 270, 10.1016/0022-0000(84)90070-9 Gordon, 1993, Discrete logarithms in GF(P) using the number field sieve, SIAM J. Discrete Math., 6, 124, 10.1137/0406010 Hamadi, 1998, Backtracking in distributed constraint networks, 219 Herlea, 2001, On securely scheduling a meeting, 183 Koblitz, 1987, Elliptic curve cryptosystems, Math. Comput., 48, 203, 10.1090/S0025-5718-1987-0866109-5 Menezes, 1996 Mesequer, 2000, Distributed forward checking Micali, 1991, Secure computation, vol. 576, 392 Miller, 1986, Use of elliptic curves in cryptography, 417 Paillier, 1999, Public-key cryptosystems based on composite degree residuosity classes, 223 Pedersen, 1991, A threshold cryptosystem without a trusted party, vol. 547, 522 Shamir, 1979, How to share a secret, Comm. ACM, 22, 612, 10.1145/359168.359176 M.-C. Silaghi, Asynchronously solving problems with privacy requirements, Ph.D. Thesis, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, 2002 Silaghi, 2003, Solving a distributed csp with cryptographic multi-party computations, without revealing constraints and without involving trusted servers Silaghi, 2000, Asynchronous search with aggregations, 917 Silaghi, 2000, Asynchronous search with private constraints Stadler, 1996, Publicly verifiable secret sharing, vol. 1070, 190 Suyama, 2001, Solving satisfiability problems using reconfigurable computing, IEEE Trans. VLSI, 9, 109, 10.1109/92.920826 Suzuki, 2002, Secure combinatorial auctions by dynamic programming with polynomial secret sharing, vol. 2357, 44 Tsiounis, 1998, On the security of elgamal based encryption, 117 Yokoo, 2001 Yokoo, 1992, Distributed constraint satisfaction for formalizing distributed problem solving, 614 Yokoo, 1998, The distributed constraint satisfaction problem: formalization and algorithms, IEEE Trans. Knowledge Data Engrg., 10, 673, 10.1109/69.729707 Yokoo, 1996, Distributed breakout algorithm for solving distributed constraint satisfaction problems, 401 Yokoo, 2002, Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions, 112