Skip to main content

PBS: Private Bartering Systems

  • Conference paper
Financial Cryptography and Data Security (FC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5143))

Included in the following conference series:

Abstract

Barter trade is a growing part of the world economy. Hundreds of thousands of companies in the US alone participate in barter. Barter is also used in other domains, such as resource management in distributed systems. Existing algorithms for finding barter trades require that values of goods are publicly known (whether they are set by a global function or individual utility functions for each user). The fact that each user must reveal her utility function in order to find barter trades is a potential disincentive to using bartering. We present a first step in the creation of a privacy-preserving bartering system. We present algorithms and privacy-preserving protocols in the honest but curious model for determining the existence of win-win trades (and algorithms and protocols for finding such trades). We discuss a number of remaining open problems and extensions for future work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abraham, D.J., Blum, A., Sandholm, T.: Clearing algorithms for barter exchange markets: enabling nationwide kidney exchanges. In: EC 2007: Proceedings of the 8th ACM Conference on Electronic Commerce, pp. 295–304. ACM Press, New York (2007)

    Chapter  Google Scholar 

  2. Ackemann, T., Gold, R., Mascolo, C., Emmerich, W.: Incentives in peer-to-peer and grid networking. Technical report, University College London (2002)

    Google Scholar 

  3. Ajtai, M., Komlós, J., Szemerédi, E.: An 0(n log n) sorting network. In: STOC 1983: Proceedings of the fifteenth annual ACM symposium on Theory of computing, pp. 1–9. ACM Press, New York (1983)

    Chapter  Google Scholar 

  4. Bhavsar, V.C., Boley, H., Yang, L.: A weighted tree similarity algorithm for multi-agent system in e-business environments. In: Workshop on Business Agents and the Semantic Web, pp. 53–72 (June 2003)

    Google Scholar 

  5. Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143–202 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  6. Cresti, B.: US domestic barter: an empirical investigation. Applied Economics 37(17), 1953–1966 (2005)

    Article  Google Scholar 

  7. Damgård, I., Jurik, M.: A length-flexible threshold cryptosystem with applications. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 350–364. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)

    Google Scholar 

  9. Frikken, K.: Privacy-preserving set union. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 237–252. Springer, Heidelberg (to appear, 2007)

    Chapter  Google Scholar 

  10. Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: WPES 2004: Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pp. 8–15. ACM Press, New York (2004)

    Chapter  Google Scholar 

  11. Fu, Y., Chase, J., Chun, B., Schwab, S., Vahdat, A.: SHARP: an architecture for secure resource peering. In: SOSP 2003: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 133–148. ACM Press, New York (2003)

    Chapter  Google Scholar 

  12. Ganesan, P., Seshadri, M.: On cooperative content distribution and the price of barter. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 81–90 (June 2005)

    Google Scholar 

  13. Goethals, B., Laur, S., Lipmaa, H., Mielikainen, T.: On private scalar product computation for privacy-prerving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005)

    Google Scholar 

  14. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218–229 (May 1987)

    Google Scholar 

  15. Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270–299 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  16. Haddawy, P., Rujikeadkumjorn, N., Dhananaiyapergse, K., Cheng, C.: Balanced matching of buyers and sellers in e-marketplaces: the barter trade exchange model. In: ICEC 2004, pp. 85–94. ACM Press, New York (2004)

    Chapter  Google Scholar 

  17. Intervac international home exchange (Last viewed: 10-08-2007), http://www.intervac.com

  18. International reciprocal trade association (Last viewed: 10-08-2007), www.irta.com

  19. Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005), http://www.cs.cmu.edu/~leak/

    Google Scholar 

  20. López, N., Núñez, M., Rodríguez, I., Rubio, F.: A formal framework for e-barter based on microeconomic theory and process algebras. In: Unger, H., Böhme, T., Mikler, A.R. (eds.) IICS 2002. LNCS, vol. 2346, pp. 217–228. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  21. López, N., Núñez, M., Rodríguez, I., Rubio, F.: A multi-agent system for e-barter including transaction and shipping costs. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 587–594. Springer, Heidelberg (2004)

    Google Scholar 

  22. Marin, D., Schnitzer, M.: The economic institution of international barter. The Economic Journal 112(479), 293–316 (2002)

    Article  Google Scholar 

  23. Mathieu, S.: Match-making in bartering scenarios. Master’s thesis, The University of New Brunswick (December 2005)

    Google Scholar 

  24. Muir, D.: Man trades up from paper clip to house (July 9, 2006), http://www.abcnews.go.com/wnt/story?id=2171378

  25. National association of trade exchanges (Last viewed: 10-08-2007), www.nate.org

  26. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  27. Peerflix (Lastviewed: 10-08-2007), www.peerflix.com

  28. Read it swap it (Last viewed: 10-08-2007), www.readitswapit.co.uk

  29. Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, pp. 162–167 (1986)

    Google Scholar 

  30. Yao, D., Frikken, K.B., Atallah, M.J., Tamassia, R.: Point-based trust: Define how much privacy is worth. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 190–209. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Gene Tsudik

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frikken, K., Opyrchal, L. (2008). PBS: Private Bartering Systems. In: Tsudik, G. (eds) Financial Cryptography and Data Security. FC 2008. Lecture Notes in Computer Science, vol 5143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85230-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85230-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85229-2

  • Online ISBN: 978-3-540-85230-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics