Abstract
When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas private. This paper presents several approaches which intend to solve this contradiction. A custom-made protocol for secure meeting scheduling and a protocol based on secure distributed computing are discussed. The security properties and complexity of these protocols are compared. A trade-off between trust and bandwidth requirements is shown to be possible by implementing the protocols using mobile agents.
Chapter PDF
Similar content being viewed by others
References
D. Chaum, I. Damgård, J. van de Graaf, “Multiparty computations ensuring privacy of each party’s input and correctness of the result.” In C. Pomerance, ed., Advances in Cryptology-CRYPTO’ 87 Proceedings, Lecture Notes in Computer Science, LNCS 293, pp. 87–119, Springer-Verlag, New York, 1988.
R. Cramer, “An introduction to secure computation.” In I. Damgård, ed., Lectures on Data Security, Lecture Notes in Computer Science, LNCS 1561, pp. 16–62, 1999.
B. De Decker, F. Piessens, E. Van Hoeymissen, G. Neven, “Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.” In E. Horlait, ed., Mobile Agents for Telecommunication Applications, Lecture Notes in Computer Science, LNCS 1931, pp. 219–232, Springer-Verlag, 2000.
M. Franklin, “Complexity and security of distributed protocols.” Ph.D. thesis, Computer Science Department of Columbia University, New York, 1993.
M. Franklin and S. Haber, “Joint encryption and message-efficient secure computation.” Journal of Cryptology, 9(4), pp. 217–232, Autumn 1996.
T. Herlea, J. Claessens, D. De Cock, B. Preneel, J. Vandewalle, “Secure Meeting Scheduling with agenTa.” Proceedings of IFIP Communications and Multimedia Security, 2001.
Danny B. Lange, Mitsuru Oshima, “Mobile agents with Java: The Aglet API.” http://www.genmagic.com/asa/danny/Wwwj.pdf.
Chelliah Thirunavukkarasu, Tim Finin, James Mayfield, “Secret Agents-A Security Architecture for the KQML Agent Communication Language.” http://www.cs.umbc.edu/kqml/papers/secret.ps.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this paper
Cite this paper
Herlea, T., Claessens, J., Preneel, B., Neven, G., Piessens, F., De Decker, B. (2001). On Securely Scheduling a Meeting. In: Dupuy, M., Paradinas, P. (eds) Trusted Information. SEC 2001. IFIP International Federation for Information Processing, vol 65. Springer, Boston, MA. https://doi.org/10.1007/0-306-46998-7_13
Download citation
DOI: https://doi.org/10.1007/0-306-46998-7_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7389-6
Online ISBN: 978-0-306-46998-5
eBook Packages: Springer Book Archive