2,559 Hits in 3.2 sec

Lightweight Self-Bootstrapping Multiparty Computations of Time-Series Data with Custom Collusion Tolerance [article]

Michael Clear and Constantinos Patsakis and Paul Laird
2014 arXiv   pre-print
We prove that both protocols remain secure with this technique, and evaluate its impact on collusion tolerance and the number of rounds supported.  ...  Furthermore, we introduce a technique that allows the computational load of both protocols to be reduced at the expense of protection against collusion tolerance.  ...  However, depends on the acceptable collusion tolerance t ≤ n. Both singleround and multi-round KDK are t-private for any t ≤ n.  ... 
arXiv:1402.7118v1 fatcat:zahpok5iozhvfn6b5iypufza3y

E-DPNCT: An Enhanced Attack Resilient Differential Privacy Model For Smart Grids Using Split Noise Cancellation [article]

Khadija Hafeez, Donna OShea, Mubashir Husain Rehmani
2021 arXiv   pre-print
The DPNCT model relies on trusted master smart meters and is vulnerable to collusion attack where adversary collude with malicious smart meters in order to get private information of other smart meters  ...  We did extensive comparison of our E-DPNCT model with state of the art attack resistant privacy preserving models such as EPIC for collision attack and with Barbosa Differentialy Private (BDP) model for  ...  ACKNOWLEDGEMENT This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) and is funded under the Grant Number 18/CRT/6222.  ... 
arXiv:2110.11091v2 fatcat:trriqksyf5dwnnwdqlvfxzfme4

OUP accepted manuscript

2019 The Review of financial studies  
In general, blockchains sustain market equilibria with a wider range of economic outcomes. We further discuss the implications for antitrust policies targeted at blockchain applications.  ...  contracts can mitigate informational asymmetry and improve welfare and consumer surplus through enhanced entry and competition, yet distributing information during consensus generation may encourage greater collusion  ...  However, this repeated game with private monitoring is essentially a game with imperfect public monitoring, because sellers can use the private observation to infer whether there is aggregate activity  ... 
doi:10.1093/rfs/hhz007 fatcat:nlbsv3nnbrgapnzq7nnaudzjiu

Fault Tolerant Multi-subset Aggregation Scheme for Smart Grid

Xiaodi Wang, Yining Liu, Kim-Kwang Raymond Choo
2020 IEEE Transactions on Industrial Informatics  
Therefore, in this article, a fault-tolerant multisubset data aggregation scheme is proposed.  ...  One particular challenge associated with smart grid implementation is the need to ensure privacy preserving multisubset data aggregation.  ...  Proof: Although DC decrypts C = n i=1 c i with the private key (λ, μ) to obtain the aggregated result D = ( k j=1 a j i∈U j Δm i ) + ( k j=1 b j · |U j |), DC cannot decrypt each single user's ciphertext  ... 
doi:10.1109/tii.2020.3014401 fatcat:awg2xwgvcve67duvmqmo4hzcyy

A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks

Joyce Jose, Josna Jose, M. Princy
2014 Journal of Computing and Information Technology  
It can tolerate the collusion up to a threshold. i.e., sum of out degree and in degree minus one.  ...  During the aggregation in a cluster, every sensor node in a cluster customizes its private data into a polynomial of order k − 1 using shared seeds (non private) and random numbers (private).  ...  Topology Protocols CMC CPC EC AUC DLR DLY PLS MC Aggregation functions 6. Data Privacy: It ensures that the data is only known to the owner, even if adversaries get the secret information.  ... 
doi:10.2498/cit.1002318 fatcat:cmaq2uhsibbvdbu2dst7t4ulpm

Integrity Protecting and Privacy Preserving Data Aggregation Protocols in Wireless Sensor Networks: A Survey

Joyce Jose, M. Princy, Josna Jose
2013 International Journal of Computer Network and Information Security  
This paper summarises on such IPPDA protocols during data aggregation.  ...  The Integrity Protecting Privacy preserving Data Aggregation (IPPDA) protocols ensures a robust and accurate results at the base station.  ...  It can tolerate the collusion up to a certain threshold by expanding the number of slices, so the communication overhead also raised.  ... 
doi:10.5815/ijcnis.2013.07.08 fatcat:ul4b73w77neqdh4fir5o3t4dne

Security model for a multi-agent marketplace

Ashutosh Jaiswal, Yongdae Kim, Maria Gini
2003 Proceedings of the 5th international conference on Electronic commerce - ICEC '03  
Our solution makes use of three different existing technologies with other standard cryptographic techniques: publish/subscribe systems that provide simple and more general messaging, time-release cryptography  ...  In case of customer-supplier collusion, the whole purpose of conducting an auction becomes useless.  ...  This assumption is necessary to ensure that avenues for customer-supplier collusion are discouraged and reduced.  ... 
doi:10.1145/948005.948021 dblp:conf/ACMicec/JaiswalKG03 fatcat:77brb3kqgjdrbgxbzjx6bonjti

Design and implementation of a secure multi-agent marketplace

Ashutosh Jaiswal, Yongdae Kim, Maria Gini
2004 Electronic Commerce Research and Applications  
Our solution makes use of three different existing technologies with standard cryptographic techniques: a publish/subscribe system to provide simple and general messaging, time-release cryptography to  ...  Including fault tolerance into the system, so that the auction does not fail because of the failure of the entities involved, is also a part of our future plans.  ...  This assumption is necessary to ensure that avenues for customer-supplier collusion are discouraged and reduced.  ... 
doi:10.1016/j.elerap.2004.06.005 fatcat:tpbmic3h2fajfe5hzyywgy2i4i

Breaking Up is Hard to Do: Determinants of Cartel Duration

Margaret C. Levenstein, Valerie Y. Suslow
2010 Social Science Research Network  
The lure of collusive profits, however, provides firms with a strong incentive to reduce that uncertainty.  ...  Cartels respond to imperfect or noisy information by trying to create governance and compensation systems that raise the quality and credibility of information and better align individual firm incentives with  ...  We do observe small violations of collusive agreements, but these deviations are either tolerated or punished lightly.  ... 
doi:10.2139/ssrn.1676968 fatcat:72lphzebhvhy3lqbp4mxprdqku

Fault-Tolerant Privacy-Preserving Data Aggregation for Smart Grid

Huadong Liu, Tianlong Gu, Yining Liu, Jingcheng Song, Zhixin Zeng
2020 Wireless Communications and Mobile Computing  
tolerance with accurate aggregation using Shamir's secret sharing without any online trusted entity.  ...  The fault tolerance is an important requirement to improve the robustness of data aggregation protocols, which enables normal execution of the protocols even with failures on some entities.  ...  Acknowledgments The study of the manuscript titled "Fault-tolerant Privacypreserving Data Aggregation for Smart Grid" is funded by the National Natural Science Foundation of China under grant no. 61662016  ... 
doi:10.1155/2020/8810393 fatcat:heorx6sodrgt5fbvrbn5rwjccu

A Survey on Privacy-preserving Schemes for Smart Grid Communications [article]

Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang
2016 arXiv   pre-print
2) Data aggregation communications, 3) Smart grid marketing architecture, 4) Smart community of home gateways, and 5) Vehicle-to grid architecture.  ...  In addition, we review the survey articles published in the recent years that deal with Smart Grids communications, applications, standardization, and security.  ...  [15] proposes a scheme called DPAFT, which is a new differentially private data aggregation scheme with fault tolerance in order to provide fault tolerance for smart metering.  ... 
arXiv:1611.07722v1 fatcat:rfw2j642ljajpcwxlaf5q5pmhy

Collusive Piracy Prevention in P2P Content Delivery Networks

Xiaosong Lou, Kai Hwang
2009 IEEE transactions on computers  
Pirates are thus severely penalized with no chance to download successfully in tolerable time. Based on simulation results, we find 99.9 percent prevention rate in Gnutella, KaZaA, and Freenet.  ...  Collusive piracy is the main source of intellectual property violations within the boundary of a P2P network.  ...  Containment of Peer Collusion to Stage Piracy Our system is unique from any existing P2P copyright protection scheme in that we recognize that peer collusion is inevitable: a paid customer may intentionally  ... 
doi:10.1109/tc.2009.26 fatcat:hjrci3k2jnh27gk3ab2qasjmyy

Fault-Tolerant Privacy-Preserving Statistics [chapter]

Marek Jawurek, Florian Kerschbaum
2012 Lecture Notes in Computer Science  
Existing protocols for this private distributed aggregation model suffer from various drawbacks that disqualify them for application in the smart energy grid.  ...  Either they are not fault-tolerant or if they are, then they require bidirectional communication or their accuracy decreases with an increasing number of failures.  ...  and the MEREGIO project with reference number 01ME08006.  ... 
doi:10.1007/978-3-642-31680-7_12 fatcat:ovknsfbs7fduzkhrbvl2bzyumq

A Theory of Oligopoly

George J. Stigler
1964 Journal of Political Economy  
Then the variance of the firm's share of sales to new customers will be nns(Is), and the aggregate for the industry will be C = n E s ( 1s) for r firms.  ...  There are no "old" buyers and n, new customers, with n,, = Xno and n, sellers.  ...  In general one would expect an upper limit to the ratio alp, because it becomes cheaper to resort to other goods (custom tailoring in our example), or to abandon the attempt to find appropriate goods.  ... 
doi:10.1086/258853 fatcat:lykyrswzgjg7nb4rwcyhzdd4zu

Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

Rabindra Bista, Jae-Woo Chang
2010 Sensors  
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node.  ...  In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status.  ...  In addition, it can tolerate the collusion of up to a certain threshold number of sensor nodes.  ... 
doi:10.3390/s100504577 pmid:22399893 pmcid:PMC3292133 fatcat:6hfts6ssgbedxdersv4c72ee2a
« Previous Showing results 1 — 15 out of 2,559 results