Towards Privacy-Preserving Multi-party Bartering

  • Stefan WüllerEmail author
  • Ulrike Meyer
  • Susanne Wetzel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10323)


Both B2B bartering as well as bartering between individuals is increasingly facilitated through online platforms. However, typically these platforms lack automation and tend to neglect the privacy of their users by leaking crucial information about trades. It is in this context that we devise the first privacy-preserving protocol for automatically determining an actual trade between multiple parties without involving a trusted third party.



This work was supported by DFG Award ME 3704/4-1.


  1. 1.
    Aïmeur, E., Brassard, G., Mani Onana, F.S.: Blind sales in electronic commerce. In: Proceedings of the 6th International Conference on Electronic Commerce, pp. 148–157. ACM (2004)Google Scholar
  2. 2.
    Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Damgård, I., Jurik, M.: A Generalisation, a Simplification and some applications of paillier’s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001). CrossRefGoogle Scholar
  4. 4.
    Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). CrossRefGoogle Scholar
  5. 5.
    Förg, F., Mayer, D., Wetzel, S., Wüller, S., Meyer, U.: A secure two-party bartering protocol using privacy-preserving interval operations. In: 12th Annual International Conference on Privacy, Security and Trust, pp. 57–66 (2014)Google Scholar
  6. 6.
    Franklin, M., Tsudik, G.: Secure group barter: multi-party fair exchange with semi-trusted neutral parties. In: Hirchfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 90–102. Springer, Heidelberg (1998). CrossRefGoogle Scholar
  7. 7.
    Frikken, K., Opyrchal, L.: PBS: private bartering systems. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 113–127. Springer, Heidelberg (2008). CrossRefGoogle Scholar
  8. 8.
    Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2009)zbMATHGoogle Scholar
  9. 9.
    Kannan, S., Morgenstern, J., Rogers, R., Roth, A.: Private pareto optimal exchange. In: Proceedings of the Sixteenth ACM Conference on Economics and Computation, pp. 261–278. ACM (2015)Google Scholar
  10. 10.
    López, N., Núñez, M., Rodríguez, I., Rubio, F.: A multi-agent system for e-barter including transaction and shipping costs. In: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 587–594. ACM (2003)Google Scholar
  11. 11.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  12. 12.
    Nzouonta, J., Silaghi, M.-C., Yokoo, M.: Secure computation for combinatorial auctions and market exchanges. In: Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1398–1399. IEEE Computer Society (2004)Google Scholar
  13. 13.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). Google Scholar
  14. 14.
    Wüller, S., Meyer, U., Förg, F., Wetzel, S.: Privacy-preserving conditional random selection (extended version). In: 13th Annual Conference on Privacy, Security and Trust, pp. 44–53 (2015)Google Scholar
  15. 15.
    Wüller, S., Meyer, U., Wetzel, S.: Towards privacy-preserving multi-party bartering (extended version). Technical report AIB-2016-10, RWTH Aachen (2016)Google Scholar
  16. 16.
    Wüller, S., Pessin, W., Meyer, U., Wetzel, S.: Privacy-preserving two-party bartering secure against active adversaries. In: 14th Annual Conference on Privacy, Security and Trust, pp. 229–238 (2016)Google Scholar
  17. 17.
    Wüller, S., Mayer, D., Förg, F., Schüppen, S., Assadsolimani, B., Meyer, U., Wetzel, S.: Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques. J. Comput. Secur. 25(1), 59–81 (2017)CrossRefGoogle Scholar

Copyright information

© International Financial Cryptography Association 2017

Authors and Affiliations

  1. 1.RWTH Aachen UniversityAachenGermany
  2. 2.Stevens Institute of TechnologyHobokenUSA

Personalised recommendations