STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Communications of the ACM
Solving satisfiability problems using reconfigurable computing
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special issue on low power electronics and design
On securely scheduling a meeting
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
The Distributed Constraint Satisfaction Problem: Formalization and Algorithms
IEEE Transactions on Knowledge and Data Engineering
Asynchronous Search with Aggregations
Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on Innovative Applications of Artificial Intelligence
Distributed Constraint Satisfaction Algorithm for Complex Local Problems
ICMAS '98 Proceedings of the 3rd International Conference on Multi Agent Systems
Interleaved Backtracking in Distributed Constraint Networks
ICTAI '01 Proceedings of the 13th IEEE International Conference on Tools with Artificial Intelligence
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
FC'02 Proceedings of the 6th international conference on Financial cryptography
Protocol/Mechanism Design for Cooperation/Competition
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
The Effect of Policies for Selecting the Solution of a DisCSP on Privacy Loss
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Bumping strategies for the multiagent agreement problem
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Autonomous Agents and Multi-Agent Systems
Nogood based asynchronous distributed optimization (ADOPT ng)
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Multiply-constrained distributed constraint optimization
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Experimental analysis of privacy loss in DCOP algorithms
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
SSDPOP: improving the privacy of DCOP with secret sharing
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Privacy-preserving linear programming
Proceedings of the 2009 ACM symposium on Applied Computing
Privatizing constraint optimization
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Analysis of privacy loss in distributed constraint optimization
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
Journal of Artificial Intelligence Research
Distributed forward checking may lie for privacy
CSCLP'06 Proceedings of the constraint solving and contraint logic programming 11th annual ERCIM international conference on Recent advances in constraints
Local search for distributed asymmetric optimization
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Balancing local resources and global goals in multiply-constrained DCOP
Multiagent and Grid Systems
Distributed constraint programming with agents
ICAIS'11 Proceedings of the Second international conference on Adaptive and intelligent systems
The power of ants in solving Distributed Constraint Satisfaction Problems
Applied Soft Computing
Asymmetric distributed constraint optimization problems
Journal of Artificial Intelligence Research
Protecting privacy through distributed computation in multi-agent decision making
Journal of Artificial Intelligence Research
Secure and efficient distributed linear programming
Journal of Computer Security - DBSec 2011
Hi-index | 0.00 |
This paper develops a secure distributed Constraint Satisfaction algorithm. A Distributed Constraint Satisfaction Problem (DisCSP) is a CSP in which variables and constraints are distributed among multiple agents. A major motivation for solving a DisCSP without gathering all information in one server is the concern about privacy/security. However, existing DisCSP algorithms leak some information during the search process and privacy/security issues are not dealt with formally. Our newly developed algorithm utilizes a public key encryption scheme. In this algorithm, multiple servers, which receive encrypted information from agents, cooperatively perform a search process that is equivalent to a standard chronological backtracking. This algorithm does not leak any private information, i.e., neither agents nor servers can obtain any additional information on the value assignment of variables that belong to other agents.