skip to main content
10.1145/1276958.1277214acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
Article

A genetic algorithm for privacy preserving combinatorial optimization

Published:07 July 2007Publication History

ABSTRACT

We propose a protocol for a local search and a genetic algorithm for the distributed traveling salesman problem (TSP). In the distributed TSP, information regarding the cost function such as traveling costs between cities and cities to be visited are separately possessed by distributed parties and both are kept private each other. We propose a protocol that securely solves the distributed TSP by means of a combination of genetic algorithms and a cryptographic technique, called the secure multiparty computation. The computation time required for the privacy preserving optimization is practical at some level even when the city-size is more than a thousand.

References

  1. Philip W. Blasmeier and Wendell J. Voisin, Supply Chain Management: A Time-Based Strategy, Industrial Management, September-October 1996, pp. 24--27, (1996).Google ScholarGoogle Scholar
  2. Robert B. Handfield and Ernest L. Nichols, Introduction to Supply Chain Management, Prentice Hall, 1st edition (1998).Google ScholarGoogle Scholar
  3. Andrew C.-C. Yao, Protocols for secure computation, Proc. of IEEE Symposium on Foundations of Computer Science (FOCS), pp. 160--164 (1982).Google ScholarGoogle Scholar
  4. M.-C. Silaghi and D. Mitra, Distributed constraint satisfaction and optimization with privacy enforcement, Intelligent Agent Technology, pp, 531--535, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Koutarou Suzuki and Makoto Yokoo, Secure Generalized Vickrey Auction using Homomorphic Encryption, Seventh International Financial Cryptography Conference (FC-03) (2003).Google ScholarGoogle Scholar
  6. Kokoro Ikeda, Shigenobu Kobayashi, Deterministic Multi-step Crossover Fusion:A Handy Crossover for GAs, PPSN 7, pp. 162--171, (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Pascal Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999, pp. 223--238, (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bart Goethals, Sven Laur, Helger Lipmaa and Taneli Mielikainen, On Private Scalar Product Computation for Privacy-Preserving Data Mining, 7th Int'l Conf. in Information Security and Cryptology (ICISC), vol. 3506 of LNCS, pp. 104--120, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Lin and B. Kernighan, Effective heuristic algorithm for the traveling salesman problem, Oper. Res., vol. 21, pp. 498--516, (1973).Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Yuichi Nagata and Shigenobu Kobaayshi, Edge Assembly Crossover: A High-power Genetic Algorithm for the Traveling Salesman Problem, 7th Int'l. Conf. on Genetic Algorithms, pp. 450--457, (1997).Google ScholarGoogle Scholar
  11. Goldreich, O., Foundations of Cryptography II: Basic Applications, Cambridge Univ Pr. (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. E. Goldberg, Genetic Algorithm in Search, Optimization and Machine Learning, Addison Wesley, (1989). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Thierens and D. E. Goldberg, Elitist Recombination: an integrated selection recombination GA, First IEEE Congress on Evolutionary Computation, pp. 508--512 (1994).Google ScholarGoogle ScholarCross RefCross Ref
  14. H. Shimodaira, A Diversity Contral Oriented Genetic Algorithm (DCGA):Development and Experimental Results, Proc. of GECCO 1999, pp. 603--611 (1999).Google ScholarGoogle Scholar

Index Terms

  1. A genetic algorithm for privacy preserving combinatorial optimization

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GECCO '07: Proceedings of the 9th annual conference on Genetic and evolutionary computation
      July 2007
      2313 pages
      ISBN:9781595936974
      DOI:10.1145/1276958

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 July 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      GECCO '07 Paper Acceptance Rate266of577submissions,46%Overall Acceptance Rate1,669of4,410submissions,38%

      Upcoming Conference

      GECCO '24
      Genetic and Evolutionary Computation Conference
      July 14 - 18, 2024
      Melbourne , VIC , Australia

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader