By Topic

Privacy preserving e-negotiation protocols based on secure multi-party computation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chakraborty, S. ; Manage. Inf. Syst., Indian Inst. of Manage., Calcutta, India ; Sehgal, S.K. ; Pal, A.K.

In this paper, we have presented several algorithms based on distributed secure multiparty computation. We have applied these algorithms to develop e-negotiation protocols for collaborative supply chain planning. Preserving the privacy of the participants' data is an important issue in these protocols. The first protocol supports a policy of non-discriminatory pricing where the buying firms do not want to reveal their bids regarding price and demand before the supplier announces a fixed selling price common for all the buyers. Price is never disclosed for any buyer in this negotiation. In the second protocol we relax the assumption for the discrimination of prices for different buyer agents. The protocol attempts to find the joint gains between the buyers and seller by optimizing the total cost of the supply chain without disclosure of total cost or individual costs to each other or the mediator agent used for the purpose.

Published in:

SoutheastCon, 2005. Proceedings. IEEE

Date of Conference:

8-10 April 2005