Solving linear programs using multiparty computation

33Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Solving linear programming (LP) problems can be used to solve many different types of problems. Immediate examples include certain types of auctions as well as benchmarking. However, the input data may originate from different, mistrusting sources, which implies the need for a privacy preserving solution. We present a protocol solving this problem using black-box access to secure modulo arithmetic. The solution can be instantiated in various settings: Adversaries may be both active and adaptive, but passive and/or static ones can be employed, e.g. for efficiency reasons. Perfect security can be obtained in the information theoretic setting (up to 1/3 corruptions), while corruption-of-all-but-one is possible in the cryptographic setting. The latter allows a two-party protocol. The solution is based on the well known simplex method. Letting n denote the number of initial variables and m the number of constraints, each pivot requires only rounds in which multiplication protocols and comparison protocols are invoked; this is equivalent to the base-algorithm. A constant-rounds variation is also possible, this increases the number of comparisons to . © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Toft, T. (2009). Solving linear programs using multiparty computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5628 LNCS, pp. 90–107). https://doi.org/10.1007/978-3-642-03549-4_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free