2001
DOI: 10.1007/0-306-46998-7_13
|View full text |Cite
|
Sign up to set email alerts
|

On Securely Scheduling a Meeting

Abstract: Keywords:When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas private. This paper presents several approaches which intend to solve this contradiction. A custom-made protocol for secure meeting scheduling and a protocol based on secure distributed computing are discussed. The security properties and complexity of these protocols are compared. A trade-off between trust and bandwidth requirements i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…In the literature, the four most relevant bodies of work that address privacy in scheduling or similar scenarios are based on techniques from private set-intersection [20,11], distributed constraint satisfaction [27,28,24,25], secure multi-party computation [18,12] and e-voting [19]. Hereafter, we review the most relevant aspects of such approaches.…”
Section: State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…In the literature, the four most relevant bodies of work that address privacy in scheduling or similar scenarios are based on techniques from private set-intersection [20,11], distributed constraint satisfaction [27,28,24,25], secure multi-party computation [18,12] and e-voting [19]. Hereafter, we review the most relevant aspects of such approaches.…”
Section: State Of the Artmentioning
confidence: 99%
“…Solutions based on secure multi-party computation were investigated in [12] and a practical scheme was proposed in [18]. Herlea et al [18], for instance, design and evaluate a distributed secure scheduling protocol by relying on properties of the XOR operation over binary values, in which all users contribute to the secrecy of individual schedules while ensuring the correctness of the results.…”
Section: State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…We are aware about only one specific publication on secure and verifiable event scheduling [35], which in fact covers three different approaches to the problem. One is a solution based on a trusted third party, which is efficient, but stands in contrast to our requirement of limited trust in a central entity.…”
Section: Specific Prior Workmentioning
confidence: 99%
“…An arithmetic circuit whose outcome is the set of all solutions was designed in [3]. If one tries to use that approach when only one solution is needed, the result returned by the function will reveal to everybody a lot more information than needed.…”
Section: Problem Subtletiesmentioning
confidence: 99%