Hiccups on the road to privacy-preserving linear programming

Date

2009

Authors

Bednarz, A.
Bean, N.
Roughan, M.

Editors

Al-Shaer, E.
Paraboschi, S.

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Conference paper

Citation

ACM Conference on Computer and Communications Security. Proceedings, 2009: pp.117-120

Statement of Responsibility

Alice Bednarz, Nigel Bean and Matthew Roughan

Conference Name

Conference on Computer and Communications Security (2009 : Chicago, U.S.A.)

Abstract

Linear programming is one of maths’ greatest contributions to industry. There are many places where linear programming could be beneficially applied across more than one company, but there is a roadblock: companies have secrets. The data needed for joint optimization may need to be kept private because of concerns about leaking competitively sensitive data, or due to privacy legislation. Recent research has tackled the problem of privacy-preserving linear programming. One appealing group of approaches uses a ‘disguising’ transformation to allow one party to perform the joint optimization without seeing the secret data of the other parties. These approaches are very appealing from the point of view of simplicity, efficiency, and flexibility, but we show here that all of the existing transformations have a critical flaw.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2009 ACM

License

Grant ID

Call number

Persistent link to this record