Download now Free registration required
Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper the authors present a privacy-preserving transformation that allows secure outsourcing of the linear program computation in an efficient manner. They evaluate security by quantifying the leakage about the input after the transformation and present implementation results. Using this transformation, they can mostly replace the costly cryptographic operations and securely solve problems several orders of magnitude larger.
- Format: PDF
- Size: 324.9 KB