Secure Supply-Chain Protocols.

CEC(2003)

引用 99|浏览26
暂无评分
摘要
Supply chain interactions have huge economic impor- tance, yet these interactions are managed inefficiently. One of the major sources of inefficiency in supply-chain man- agement is information asymmetry; i.e., information that is available to one or more organizations in the chain (e.g., manufacturer, retailer) is not available to others. There are several causes of information asymmetry, among them fear that a powerful buyer or supplier will take advantage of private information, that information will leak to a com- petitor, etc. We propose Secure Supply-Chain Collabora- tion (SSCC) protocols that enable supply-chain partners to cooperatively achieve desired system-wide goals with- out revealing the private information of any of the parties, even though the jointly-computed decisions require the in- formation of all the parties. Secure supply-chaincollabora- tion has the potential to improve supply-chain management practice, and, by removing one major inefficiency therein, improve productivity. We present specific SSCC protocols for two types of supply-chain interactions: Capacity allo- cation, and e-auctions. In the course of doing so, we design techniquesthat are of independentinterest, and are likely to be useful in the design of future SSCC protocols.
更多
查看译文
关键词
protocols,cryptographic protocols,secure multiparty computation,supply chain,supply chains,privacy,resource management,information security,security,private information,economy,supply chain management,e auction,government,national security,collaboration,cryptography,e commerce,secure multi party computation,information asymmetry,electronic commerce
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要