Privacy Preserving Implementation of the Max-Sum Algorithm and its Variants

One of the basic motivations for solving DCOPs is maintaining agents' privacy. Thus, researchers have evaluated the privacy loss of DCOP algorithms and defined corresponding notions of privacy preservation for secured DCOP algorithms. However, no secured protocol was proposed for Max-Sum, which is among the most studied DCOP algorithms. As part of the ongoing effort of designing secure DCOP algorithms, we propose P-Max-Sum, the first private algorithm that is based on Max-Sum. The proposed algorithm has multiple agents preforming the role of each node in the factor graph, on which the Max-Sum algorithm operates. P-Max-Sum preserves three types of privacy: topology privacy, constraint privacy, and assignment/decision privacy. By allowing a single call to a trusted coordinator, P-Max-Sum also preserves agent privacy. The two main cryptographic means that enable this privacy preservation are secret sharing and homomorphic encryption. In addition, we design privacy-preserving implementations of four variants of Max-Sum. We conclude by analyzing the price of privacy in terns of runtime overhead, both theoretically and by extensive experimentation.

[1]  Boi Faltings,et al.  Approximations in Distributed Optimization , 2005, CP.

[2]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[3]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[4]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[5]  Sven Laur,et al.  A New Protocol for Conditional Disclosure of Secrets and Its Applications , 2007, ACNS.

[6]  Boi Faltings,et al.  Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.

[7]  Baruch Awerbuch,et al.  New Connectivity and MSF Algorithms for Shuffle-Exchange Network and PRAM , 1987, IEEE Transactions on Computers.

[8]  Robert N. Lass,et al.  DCOPolis: a framework for simulating and deploying distributed constraint reasoning algorithms , 2008, AAMAS.

[9]  Nicholas R. Jennings,et al.  Decentralised coordination of continuously valued control parameters using the max-sum algorithm , 2009, AAMAS.

[10]  Makoto Yokoo,et al.  Algorithms for Distributed Constraint Satisfaction: A Review , 2000, Autonomous Agents and Multi-Agent Systems.

[11]  Vitaly Shmatikov,et al.  Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.

[12]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[13]  Steven Okamoto,et al.  Explorative anytime local search for distributed constraint optimization , 2014, Artif. Intell..

[14]  Marcel Keller,et al.  Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..

[15]  Javier Larrosa,et al.  Improved Bounded Max-Sum for Distributed Constraint Optimization , 2012, CP.

[16]  Weixiong Zhang,et al.  Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks , 2005, Artif. Intell..

[17]  Peeter Laud,et al.  Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees , 2015, Proc. Priv. Enhancing Technol..

[18]  Roie Zivan,et al.  Max/min-sum distributed constraint optimization through value propagation on an alternating DAG , 2012, AAMAS.

[19]  Milind Tambe,et al.  Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.

[20]  Richard S. Zemel,et al.  HOP-MAP: Efficient Message Passing with High Order Potentials , 2010, AISTATS.

[21]  Nicholas R. Jennings,et al.  Max-sum decentralised coordination for sensor systems , 2008, AAMAS.

[22]  Kobbi Nissim,et al.  Secure DisCSP Protocols – From Centralized Towards Distributed Solutions , 2005 .

[23]  Makoto Yokoo,et al.  Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..

[24]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[25]  Josh Benaloh,et al.  Dense Probabilistic Encryption , 1999 .

[26]  Abhi Shelat,et al.  Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.

[27]  Robert J. McEliece,et al.  The generalized distributive law , 2000, IEEE Trans. Inf. Theory.

[28]  Tamir Tassa,et al.  Max-Sum Goes Private , 2015, IJCAI.

[29]  Mathieu Van Vyve,et al.  Securely Solving Simple Combinatorial Graph Problems , 2013, Financial Cryptography.

[30]  Tamir Tassa,et al.  P-SyncBB: A Privacy Preserving Branch and Bound DCOP Algorithm , 2016, J. Artif. Intell. Res..

[31]  Makoto Yokoo,et al.  Distributed Partial Constraint Satisfaction Problem , 1997, CP.

[32]  Steven Okamoto,et al.  Balancing exploration and exploitation in incomplete Min/Max-sum inference for distributed constraint optimization , 2017, Autonomous Agents and Multi-Agent Systems.

[33]  Tal Grinshpoun,et al.  When You Say (DCOP) Privacy, What do You Mean? - Categorization of DCOP Privacy and Insights on Internal Constraint Privacy , 2012, ICAART.

[34]  Milind Tambe,et al.  Distributed Algorithms for DCOP: A Graphical-Game-Based Approach , 2004, PDCS.

[35]  Milind Tambe,et al.  Engineering the Decentralized Coordination of UAVs with Limited Communication Range , 2013, CAEPIA.

[36]  Milind Tambe,et al.  Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[37]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[38]  Michael D. Smith,et al.  SSDPOP: improving the privacy of DCOP with secret sharing , 2007, AAMAS '07.

[39]  Nicholas R. Jennings,et al.  Bounded approximate decentralised coordination via the max-sum algorithm , 2009, Artif. Intell..

[40]  Moni Naor,et al.  Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.

[41]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[42]  Onn Shehory,et al.  Agent-Oriented Software Engineering: Reflections on Architectures, Methodologies, Languages, and Frameworks , 2014 .

[43]  Sarvapali D. Ramchurn,et al.  Decentralized Coordination in RoboCup Rescue , 2010, Comput. J..

[44]  Boi Faltings,et al.  A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.

[45]  Amnon Meisels Asynchronous Forward-Bounding , 2008 .

[46]  Milind Tambe,et al.  Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.

[47]  Makoto Yokoo,et al.  Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..

[48]  Nicholas R. Jennings,et al.  Decentralised coordination of low-power embedded devices using the max-sum algorithm , 2008, AAMAS.

[49]  Toby Walsh,et al.  Using Auxiliary Variables and Implied Constraints to Model Non-Binary Problems , 2000, AAAI/IAAI.

[50]  Makoto Yokoo,et al.  Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[51]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[52]  Tamir Tassa,et al.  A privacy-preserving algorithm for distributed constraint optimization , 2014, AAMAS.

[53]  Marius-Calin Silaghi,et al.  Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[54]  Amnon Meisels,et al.  AgentZero: A Framework for Simulating and Evaluating Multi-agent Algorithms , 2014, Agent-Oriented Software Engineering.

[55]  Abhi Shelat,et al.  Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.

[56]  Boi Faltings,et al.  Protecting Privacy through Distributed Computation in Multi-agent Decision Making , 2013, J. Artif. Intell. Res..

[57]  Richard E. Overill,et al.  Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..

[58]  Amnon Meisels,et al.  Asymmetric Distributed Constraint Optimization Problems , 2013, J. Artif. Intell. Res..