Privacy-Preserving Trade Chain Detection

Stefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we present a novel multi-party protocol to facilitate the privacy-preserving detection of trade chains in the context of bartering. Our approach is to transform the parties’ private quotes into a flow network such that a minimum-cost flow in this network encodes a set of simultaneously executable trade chains for which the number of parties that can trade is maximized. At the core of our novel protocol is a newly developed privacy-preserving implementation of the cycle canceling algorithm that can be used to solve the minimum cost flow problem on encrypted flow networks.

Original languageEnglish
Title of host publicationData Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Proceedings
EditorsJoaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios
Pages373-388
Number of pages16
DOIs
StatePublished - 2018
Event2nd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2018 held in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018 - Barcelona, Spain
Duration: 6 Sep 20187 Sep 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11025 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2018 held in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018
Country/TerritorySpain
CityBarcelona
Period6/09/187/09/18

Keywords

  • Direct Trading Partners
  • Donor Party
  • Minimum Cost Flow Problem
  • Negative Cost Cycle
  • Trade Chain

Fingerprint

Dive into the research topics of 'Privacy-Preserving Trade Chain Detection'. Together they form a unique fingerprint.

Cite this