The modification of the Bland’s Rule led to a decrease of 20% on overall pivot steps.
The protection level matrix was kept from convergence up to step 99 while the conver-
gence ratio quickly reached a value of 0.75. The total effort added by the cryptographic
protocol was reduced to 63%.
5 Conclusions
We introduced a solution for Secure Supply Chain Master Planning (SSCMP) using se-
cure computation. Traditional SCMP computes the optimal production and transporta-
tion plan across a number of parties using Linear Programming. We showed that by risk
assessment and risk handling a significant performance increase in SSCMP is possible.
We derived a methodology for risk assessment, the criticality score, in supply chains
and then modify the pricing scheme of Linear Programming handling each data item at
the appropriate risk level. In an experimental study based on a realistic scenario using
this methodology we obtained a performance gain of 37%. Future work is to extend the
applicability of the method to other algorithms for linear optimization, e.g. inner point
methods, and to extend it to other supply chain optimization problems adapting the risk
assessment step.
References
1. M. Atallah, M. Blanton, V. Deshpande, K. Frikken, J. Li, and L. Schwarz. Secure Collabo-
rative Planning, Forecasting, and Replenishment. Working Paper, Purdue University, 2005.
2. M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara. Private Collaborative Forecasting
and Benchmarking. Workshop on Privacy in the Electronic Society (WPES), 2004.
3. M. Atallah, H. Elmongui, V. Deshpande, and L. Schwarz. Secure Supply-Chain Protocols.
Proceedings of the IEEE International Conference on E-Commerce (CEC’03), 2003.
4. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In Pro-
ceedings of 22nd STOC, 1990.
5. R. Bland. New finite pivoting rules for the simplex method. Math. of Op. Res. 2, 1977.
6. F. Chen, Z. Drezner, J. Ryan, and D. Simchi-Levi. The bullwhip-effect :managerial insights
on the impact of forecasting and information on variability in a supply chain, in: Taylor, S.,
Ganeshan, R., and Magazine, M. (Eds.), Quantitative Models for Supply Chain Management,
Boston 1999.
7. G. Dantzig, and M. Thapa. Linear Programming 1: Introduction. Springer-Verlag, 1997.
8. I. Damg˚ard, and M. Jurik. A generalisation, a simplification and some applications of pail-
lier’s probabilistic public-key system. In International Workshop on Practice and Theory in
Public Key Cryptography (PKC) 2001, 2001.
9. G. Dudek, and H. Stadtler. Negotiation-based collaborative planning between supply chain
partners, in: European Journal of Operational Research 163, 2005.
10. B. Fleischmann, and H. Meyr. Planning Hierarchy, Modeling and Advanced Planning Sys-
tems, in: De Kok, A. G., Graves, S. C. (Eds.): Supply Chain Management: Design, Coor-
dination and Operation, Handbooks in Operations Research and Management Science, Vol.
11, Amsterdam 2003.
11. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings
of the 19th annual ACM symposium on Theory of computing, 1987.
55