z-logo
open-access-imgOpen Access
Self Reordering for security in generalized english auctions (GEA)
Author(s) -
Marius-Cǎlin Silaghi,
Boi V. Faltings
Publication year - 2002
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
ISBN - 1-58113-480-0
DOI - 10.1145/544741.544848
Subject(s) - computer science , negotiation , asynchronous communication , cryptography , theoretical computer science , common value auction , guard (computer science) , cryptographic primitive , schema (genetic algorithms) , class (philosophy) , computer security , distributed computing , cryptographic protocol , computer network , artificial intelligence , information retrieval , mathematics , programming language , statistics , political science , law
Distributed approaches to negotiation have special privacy properties as main advantage over existing centralized/cryptographic techniques: The problem of an agent only has to be revealed according to the needs of the negotiation. After a negotiation has closed, the agents know how much they have communicated and therefore they know an acceptable upper-bound on their privacy loss due to the search.In this article we first introduce Generalized English Auctions, a large class of negotiations that can be addressed naturally by distributed algorithms. It is then shown how a security problem found in existing protocols can be solved by enabling a certain dynamic reordering schema. We have introduced a technique allowing to add dynamic reordering to existing asynchronous complete search algorithms that have polynomial space requirements. Several recent developments of this technique are shortly mentioned.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom