Hiccups on the road to privacy-preserving linear programming
Date
2009
Authors
Bednarz, A.
Bean, N.
Roughan, M.
Editors
Al-Shaer, E.
Paraboschi, S.
Paraboschi, S.
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Conference paper
Citation
ACM Conference on Computer and Communications Security. Proceedings, 2009: pp.117-120
Statement of Responsibility
Alice Bednarz, Nigel Bean and Matthew Roughan
Conference Name
Conference on Computer and Communications Security (2009 : Chicago, U.S.A.)
Abstract
Linear programming is one of maths’ greatest contributions to industry. There are many places where linear programming could be beneficially applied across more than one company, but there is a roadblock: companies have secrets. The data needed for joint optimization may need to be kept private because of concerns about leaking competitively sensitive data, or due to privacy legislation. Recent research has tackled the problem of privacy-preserving linear programming. One appealing group of approaches uses a ‘disguising’ transformation to allow one party to perform the joint optimization without seeing the secret data of the other parties. These approaches are very appealing from the point of view of simplicity, efficiency, and flexibility, but we show here that all of the existing transformations have a critical flaw.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
Copyright 2009 ACM