Parallelizing secure linear programming

Information sharing in supply chain management can dramatically improve the performance of the supply chain. Although many such problems can be modeled and efficiently solved using linear programming (LP), security requirements prevent their implementation in the traditional way. Companies are simply reluctant to exchange such sensitive information. Secure multi-party computation can help by realizing protocols with guaranteed security. However, efficiency is a major concern. Parallel computing presents an opportunity to improve performance utilizing inherent parallel secure operations. This work focuses on practical approaches to privacy preserving parallel protocols for collaborative LP. First, it theoretically compares the approach of parallelizing a secure algorithm and securing a parallel algorithm. Their complexity being equal we implemented the simpler choice: parallelizing a secure algorithm. Different synchronization methods for the implementation are compared under different network conditions. Given the best implementation, the performance is almost independent of the network conditions, but parallelization, i.e. number of threads, needs to be adapted to such conditions. We present and evaluate an adaptive scheduling algorithm for the dynamic selection of the number of threads, such that it's not necessary to statically and up-front determine the number for optimal speed-up. The algorithm can even deal with varying network conditions. Copyright © 2009 John Wiley & Sons, Ltd.

[1]  Hau L. Lee,et al.  Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..

[2]  John A. Nelder,et al.  A Simplex Method for Function Minimization , 1965, Comput. J..

[3]  Richard Pibernik,et al.  An approach to inter-domain master planning in supply chains , 2007 .

[4]  G. L. Thompson,et al.  Solving Linear Programs Using Distributed Parallel Computing. , 1994 .

[5]  Matthew Wiswall,et al.  A Parallel Implementation of the Simplex Function Minimization Routine , 2007 .

[6]  Herbert E. Scarf,et al.  Optimal Policies for a Multi-Echelon Inventory Problem , 1960, Manag. Sci..

[7]  George B. Dantzig,et al.  Linear Programming 1: Introduction , 1997 .

[8]  Matthew K. Franklin,et al.  Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.

[9]  Ivan Damgård,et al.  A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.

[10]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[11]  Debmalya Biswas,et al.  On the practical importance of communication complexity for secure multi-party computation protocols , 2009, SAC '09.

[12]  Marshall L. Fisher,et al.  Supply Chain Inventory Management and the Value of Shared Information , 2000 .

[13]  Jacek Gondzio,et al.  Parallel interior-point solver for structured linear programs , 2003, Math. Program..

[14]  G. Rosenberg Enumeration of All Extreme Equilibria of Bimatrix Games with Integer Pivoting and Improved Degeneracy Check , 2005 .

[15]  David F. Pyke,et al.  Inventory management and production planning and scheduling , 1998 .

[16]  Mikhail J. Atallah,et al.  Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[17]  Jan Camenisch,et al.  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.

[18]  M. Padberg Linear Optimization and Extensions , 1995 .

[19]  Luigi Rizzo,et al.  Dummynet: a simple approach to the evaluation of network protocols , 1997, CCRV.

[20]  R. Kapuściński,et al.  Value of Information in Capacitated Supply Chains , 1999 .

[21]  Wang Dong,et al.  BSP-based parallel simplex method , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.

[22]  Herbert Meyr,et al.  Planning Hierarchy, Modeling and Advanced Planning Systems , 2003, Supply Chain Management.

[23]  Ivan Damgård,et al.  Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.

[24]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.

[25]  Judit Bar-Ilan,et al.  Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.

[26]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[27]  Stephen J. Wright Primal-Dual Interior-Point Methods , 1997, Other Titles in Applied Mathematics.

[28]  Ivan Damgård,et al.  Multiparty Computation Goes Live , 2008, IACR Cryptol. ePrint Arch..

[29]  Leslie G. Valiant,et al.  A bridging model for parallel computation , 1990, CACM.

[30]  Robert J. Vanderbei,et al.  Linear Programming: Foundations and Extensions , 1998, Kluwer international series in operations research and management service.

[31]  Florian Kerschbaum,et al.  Security against the business partner , 2008, SWS '08.