An Improved Two-Party Negotiation Over Continues Issues Method Secure Against Manipulatory Behavior

نویسندگان

  • Luca Barzanti
  • Marcello Mastroleo
چکیده

This contribution focuses on two-party negotiation over continuous issues. We firstly prove two drawbacks of the jointly Improving Direction Method (IDM), namely that IDM is not a Strategy-Proof (SP) nor an Information Concealing (IC) method. Thus we prove that the concurrent lack of these two properties implies the actual nonefficiency of IDM. Finally we propose a probabilistic method which is both IC and stochastically SP thus leading to efficient settlements without being affected by manipulatory behaviors. Keyword: Two-Party Negotiation, Joint Improving Direction Method, Manipulatory Behaviour, Efficient Negotiation Models

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficiency Tradeoffs for Malicious Two-Party Computation

We study efficiency tradeoffs for secure two-party computation in presence of malicious behavior. We investigate two main approaches for defending against malicious behavior in Yao’s garbled circuit method: (1) Committed-input scheme, (2) Equality-checker scheme. We provide asymptotic and concrete analysis of communication and computation costs of the designed protocols. We also develop a weake...

متن کامل

Securing Yao’s Garbled Circuit Construction Against Active Adversaries

We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the case of malicious behavior. To illustrate the need for the new protocol, we first discuss security issues of three existing protocols for secure two-party computation using garbled circuits, in the case of malicious behavior. The first is a protocol by Pinkas (Eurocrypt 2003), and the other two ...

متن کامل

Improvement of a Secure Convex Hull Two-Party Computation Protocol

In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrapping method and Quick method separately. However, there are some errors in his protocol based on Quick method. This paper proposes two effective improved protocols. In addition, we analyze and compare security, computa...

متن کامل

A Model for Multi-party Negotiations

Our model of multi-party negotiations is a many parties, many issues model. The whole multi-party negotiation consists of a set of mutually influencing bilateral negotiations that are focused on different bilateral issues. We propose to use majority rule to help parties reach group agreements. When a party is not satisfied with another party’s negotiation progress, he can send a primitive oppos...

متن کامل

Numerical Simulation of the Hydrodynamics of a Two-Dimensional Gas—Solid Fluidized Bed by New Finite Volume Based Finite Element Method

n this work, computational fluid dynamics of the flow behavior in a cold flow of fluidized bed is studied. An improved finite volume based finite element method has been introduced to solve the two-phase gas/solid flow hydrodynamic equations. This method uses a collocated grid, where all variables are located at the nodal points. The fluid dynamic model for gas/solid two-phase flow is based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1206.1783  شماره 

صفحات  -

تاریخ انتشار 2012