TY - GEN
T1 - A secure two-party bartering protocol using privacy-preserving interval operations
AU - Förg, Fabian
AU - Mayer, Daniel
AU - Wetzel, Susanne
AU - Wüller, Stefan
AU - Meyer, Ulrike
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - Bartering plays a significant role in today's global economy - both between individuals as well as in B2B settings. However, aside from lacking automation, today's bartering solutions and supporting platforms typically neglect the privacy needs of their users. In this paper, we present a novel two-party protocol which addresses these shortcomings. The new protocol automatically determines whether the desired and offered commodities and quantities overlap in such a way that both parties are willing to barter. Throughout the protocol, the commodities and quantities as specified by the parties are kept private. We show that the protocol is privacy-preserving in the semi-honest model. As main building blocks, the new bartering protocol uses a novel privacy-preserving protocol for selecting a random subinterval out of the overlap of two intervals as well as a newly-developed secure protocol for input-symmetric strong conditional oblivious transfer.
AB - Bartering plays a significant role in today's global economy - both between individuals as well as in B2B settings. However, aside from lacking automation, today's bartering solutions and supporting platforms typically neglect the privacy needs of their users. In this paper, we present a novel two-party protocol which addresses these shortcomings. The new protocol automatically determines whether the desired and offered commodities and quantities overlap in such a way that both parties are willing to barter. Throughout the protocol, the commodities and quantities as specified by the parties are kept private. We show that the protocol is privacy-preserving in the semi-honest model. As main building blocks, the new bartering protocol uses a novel privacy-preserving protocol for selecting a random subinterval out of the overlap of two intervals as well as a newly-developed secure protocol for input-symmetric strong conditional oblivious transfer.
UR - http://www.scopus.com/inward/record.url?scp=84910030944&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84910030944&partnerID=8YFLogxK
U2 - 10.1109/PST.2014.6890924
DO - 10.1109/PST.2014.6890924
M3 - Conference contribution
AN - SCOPUS:84910030944
T3 - 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
SP - 57
EP - 66
BT - 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
A2 - Miri, Ali
A2 - Josang, Audun
A2 - Garcia-Alfaro, Joaquin
A2 - Hengartner, Urs
A2 - Huang, Nen-Fu
T2 - 2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
Y2 - 23 July 2014 through 24 July 2014
ER -