A secure two-party bartering protocol using privacy-preserving interval operations

@article{Frg2014AST,
  title={A secure two-party bartering protocol using privacy-preserving interval operations},
  author={Fabian F{\"o}rg and Daniel A. Mayer and Susanne Wetzel and Stefan W{\"u}ller and Ulrike Meyer},
  journal={2014 Twelfth Annual International Conference on Privacy, Security and Trust},
  year={2014},
  pages={57-66}
}
Bartering plays a significant role in today's global economy-both between individuals as well as in B2B settings. However, aside from lacking automation, today's bartering solutions and supporting platforms typically neglect the privacy needs of their users. In this paper, we present a novel two-party protocol which addresses these shortcomings. The new protocol automatically determines whether the desired and offered commodities and quantities overlap in such a way that both parties are… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 44 REFERENCES

Sales Dog Teaches New Barter Tricks

  • T. Searcy, H. DeVries
  • http://www.forbes.com/sites/dealmakers//01/29…
  • 2013
1 Excerpt

Share, Barter and Trade: The Global Swop- Shop that is Beating the Recession and Boosting Business

  • A.-S. Novel
  • http://timesofindia.indiatimes.com/home/specials…
  • 2013
1 Excerpt

Data Bartering Is Everywhere

  • M. Millian
  • http://www.businessweek. com/articles/-11-15/data…
  • 2012
1 Excerpt

Design and Implementation of Efficient Privacy- Preserving and Unbiased Reconciliation Protocols

  • D. A. Mayer
  • Ph.D. dissertation, Stevens Institute of…
  • 2012
2 Excerpts

On the Performance of Certain Private Set Intersection Protocols

  • ——
  • ePrint Archive, Report /054, .
  • 2012

Similar Papers

Loading similar papers…