Skip to main content

Achieving Fairness in Private Contract Negotiation

  • Conference paper
Financial Cryptography and Data Security (FC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3570))

Included in the following conference series:

Abstract

Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has certain constraints on the acceptability and desirability (i.e., a private “utility” function) of each clause. If Bob were to reveal his constraints to Alice in order to find an agreement, then she would learn an unacceptable amount of information about his business operations or strategy. To alleviate this problem we propose the use of Secure Function Evaluation (SFE) to find an agreement between the two parties. There are two parts to this: i) determining whether an agreement is possible (if not then no other information should be revealed), and ii) in case an agreement is possible, coming up with a contract that is valid (acceptable to both parties), fair (when many valid and good outcomes are possible one of them is selected randomly with a uniform distribution, without either party being able to control the outcome), and efficient (no clause is replaceable by another that is better for both parties). It is the fairness constraint in (ii) that is the centerpiece of this paper as it requires novel techniques that produce a solution that is more efficient than general SFE techniques. We give protocols for all of the above in the semi-honest model, and we do not assume the Random Oracle Model.

Portions of this work were supported by Grants EIA-9903545, IIS-0219560, IIS-0312357, and IIS-0242421 from the National Science Foundation, Contract N00014-02-1-0364 from the Office of Naval Research, by sponsors of the Center for Education and Research in Information Assurance and Security, and by Purdue Discovery Park’s e-enterprise Center.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ben-Or, M., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 1–10. ACM Press, New York (1988)

    Chapter  Google Scholar 

  2. Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143–202 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  3. Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: Proceedings of the thiryfourth annual ACM symposium on Theory of computing, pp. 494–503. ACM Press, New York (2002)

    Google Scholar 

  4. Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 11–19. ACM Press, New York (1988)

    Chapter  Google Scholar 

  5. Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Frikken, K., Atallah, M.: Privacy preserving route planning. To appear in Proceeding of the ACM workshop on Privacy in the Electronic Society. ACM Press, New York (2004)

    Google Scholar 

  8. Goldreich, O.: Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  Google Scholar 

  9. Goldreich, O.: Foundations of Cryptography: Volume II Basic Application. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  10. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218–229. ACM Press, New York (1987)

    Chapter  Google Scholar 

  11. Goldreich, O.: Secure multi-party computation. Working Draft (2000)

    Google Scholar 

  12. Goldreich, O.: Cryptography and cryptographic protocols. Distrib. Comput. 16(2-3), 177–199 (2003)

    Article  MathSciNet  Google Scholar 

  13. Goldwasser, S.: Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 1–6. ACM Press, New York (1997)

    Chapter  Google Scholar 

  14. Governatori, G., ter Hofstede, A.H.M., Oaks, P.: Defeasible logic for automated negotiation. In: Swatman, P., Swatman, P.M. (eds.) Proceedings of CollECTeR, Deakin University (2000) (Published on CD)

    Google Scholar 

  15. Grosof, B.N., Labrou, Y., Chan, H.Y.: A declarative approach to business rules in contracts: courteous logic programs in XML. In: ACM Conference on Electronic Commerce, pp. 68–77 (1999)

    Google Scholar 

  16. Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Proceedings of the twenty-first annual ACM symposium on Theory of computing, pp. 44–61. ACM Press, New York (1989)

    Chapter  Google Scholar 

  17. Katz, J., Ostrovsky, R.: Round optimal secure two-party computation. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 335–354. Springer, Heidelberg (2004)

    Google Scholar 

  18. Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, Cambridge (1997)

    MATH  Google Scholar 

  19. Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: Proceedings of Usenix Security (2004)

    Google Scholar 

  20. Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 245–254. ACM Press, New York (1999)

    Chapter  Google Scholar 

  21. Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, pp. 448–457 (2001)

    Google Scholar 

  22. Okamoto, T., Uchiyama, S., Fujisaki, E.: Epoc: Efficient probabilistic public-key encryption (1998)

    Google Scholar 

  23. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  24. Schneier, B.: Applied Cryptography – Protocols, algorithms, and souce code in C. John Wiley & Sons, Inc., Chichester (1996)

    Google Scholar 

  25. Smith, R., Shao, J.: Preserving privacy when preference searching in e-commerce. In: Proceeding of the ACM workshop on Privacy in the Electronic Society, pp. 101–110. ACM Press, New York (2003)

    Chapter  Google Scholar 

  26. Strbel, M.: Intention and agreement spaces - a formalism

    Google Scholar 

  27. Yao, A.C.: Protocols for secure computation. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  28. Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, pp. 162–167 (1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frikken, K., Atallah, M. (2005). Achieving Fairness in Private Contract Negotiation. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_24

Download citation

  • DOI: https://doi.org/10.1007/11507840_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26656-3

  • Online ISBN: 978-3-540-31680-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics