Secure and efficient protocols for multiple interdependent issues negotiation

  • Authors:
  • Katsuhide Fujita;Takayuki Ito;Mark Klein

  • Affiliations:
  • (Correspd. Tel.:+81 52 735 7968/ Fax:+81 52 7357404/ E-mail: fujita@itolab.mta.nitech.ac.jp) School of Techno-Business Administration, Nagoya Institute of Technology, Gokiso, Showa-ku, Nagoya, Jap ...;School of Techno-Business Administration, Nagoya Institute of Technology, Gokiso, Showa-ku, Nagoya, Japan and Center for Collective Intelligence, Sloan School of Management, Massachusetts Institut ...;Center for Collective Intelligence, Sloan School of Management, Massachusetts Institute of Technology,Three Cambridge Center, Cambridge, USA

  • Venue:
  • Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology - Knowledge integration and management in autonomous systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Multi-issue negotiation protocols represent a promising field sincemost negotiation problems in the real world involve multiple issues. Our work focuses on negotiation with multiple interdependent issues in which agent utility functions are nonlinear. Firstly, we define utility function based on cone-constraints which are nonlinear. The utility function based on cone-constraint is more realistic than existing utility models and configures the risk attitudes to the cone-constraint. However, if the utility function has cone-constraint features, the utility space becomes extremely nonlinear, making it very difficult to find the optimal agreement point. Existing works have not yet concerned with agents' private information that should be concealed from others in negotiations. In this paper, we propose Distributed Mediator Protocol and Take it or Leave it Protocol for negotiation that can reach agreements and completely conceal agents’ private information. Moreover, we propose Hybrid Secure Protocol that combines Distributed Mediator Protocol with Take it or Leave it Protocol. The Hybrid Secure Protocol can also reach agreements while completely concealing agents’ private information. Furthermore, the Hybrid Secure Protocol achieves high optimality and uses less communication cost. We demonstrate the performance of Hybrid Secure Protocol in cone-constraints and cube-constraints situations.