A secure two-party bartering protocol using privacy-preserving interval operations

Fabian Förg, Daniel Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Bartering plays a significant role in today's global economy - both between individuals as well as in B2B settings. However, aside from lacking automation, today's bartering solutions and supporting platforms typically neglect the privacy needs of their users. In this paper, we present a novel two-party protocol which addresses these shortcomings. The new protocol automatically determines whether the desired and offered commodities and quantities overlap in such a way that both parties are willing to barter. Throughout the protocol, the commodities and quantities as specified by the parties are kept private. We show that the protocol is privacy-preserving in the semi-honest model. As main building blocks, the new bartering protocol uses a novel privacy-preserving protocol for selecting a random subinterval out of the overlap of two intervals as well as a newly-developed secure protocol for input-symmetric strong conditional oblivious transfer.

Original languageEnglish
Title of host publication2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
EditorsAli Miri, Audun Josang, Joaquin Garcia-Alfaro, Urs Hengartner, Nen-Fu Huang
Pages57-66
Number of pages10
ISBN (Electronic)9781479935031
DOIs
StatePublished - 2014
Event2014 12th Annual Conference on Privacy, Security and Trust, PST 2014 - Toronto, Canada
Duration: 23 Jul 201424 Jul 2014

Publication series

Name2014 12th Annual Conference on Privacy, Security and Trust, PST 2014

Conference

Conference2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
Country/TerritoryCanada
CityToronto
Period23/07/1424/07/14

Fingerprint

Dive into the research topics of 'A secure two-party bartering protocol using privacy-preserving interval operations'. Together they form a unique fingerprint.

Cite this