Distributed problems raise privacy issues. The user would like to specify securely his constraints (desires, availability, money) on his computer once. The computer is expected to compute and communicate for searching an acceptable solution while maintaining the privacy of the user. Even without computers infested with spy viruses that capture the interaction with the user, most agent based approaches reveal parts of one agent's secret data to its partners in distributed computations [Using privacy loss to guide decisions in distributed CSP search]. Some cryptographic multi-party computation protocols [Completeness theorems for non-cryptographic fault-tolerant distributed computating] succeed to avoid leaking secrets at the computation of some functions with private inputs. They have been applied to find the set of all solutions for the meeting scheduling problem [On securely scheduling a meeting]. However, nobody yet succeeded to apply those techniques for finding a random solution to the meeting scheduling problem. Note that revealing all solutions, when you only need a single one, leaks a lot of data about when others are, or are not, available. Some answers were proposed in our previous approaches to distributed constraint problems [Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers]. They guarantee that no agent can infer with certitude a secret from the identity of the solution of the problem (other than the acceptance of the solution), but guarantee nothing about inference of probabilistic information about secrets. Our new technique answers this problem, too.
[1]
Marius-Calin Silaghi,et al.
The effect of policies for selecting the solution of a DisCSP on privacy loss
,
2004,
Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[2]
M. Silaghi.
Solving a distributed CSP with cryptographic multi-party computations , without revealing constraints and without involving trusted servers ∗
,
.
[3]
Andrzej Skowron,et al.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence
,
2005
.
[4]
Bart De Decker,et al.
On Securely Scheduling a Meeting
,
2001,
SEC.
[5]
David Chaum,et al.
Untraceable electronic mail, return addresses, and digital pseudonyms
,
1981,
CACM.
[6]
Richard J. Wallace,et al.
Using Privacy Loss to Guide Decisions During Distributed CSP Search
,
2004,
FLAIRS Conference.
[7]
Avi Wigderson,et al.
Completeness theorems for non-cryptographic fault-tolerant distributed computation
,
1988,
STOC '88.