rithm (Algorithm 1), we return a set of EDHCs with
a size at least targetSize or we will return the best so-
lution found within the search process as the result,
given by bestEDHC - the set of EDHCs in G.
4 CONCLUDING REMARKS
This paper focused on distributed mining and the role
of Hamiltonian cycles in keeping information pri-
vate. We stated a couple of theorems on edge disjoint
Hamiltonian cycles, but without proof. Then, we pro-
posed a heuristic algorithm to enumerate these cycles.
These cycles have applications in data mining, net-
work routing and fault tolerant computing. In an ex-
tended version of this paper, we will formally prove
these theorems and compare the performance of the
heuristic algorithm with that of the greedy algorithm.
REFERENCES
Alspach, B., Bermond, J., and Sotteau, D. (1990). Decom-
position into cycles 1: Hamilton decompositions. Cy-
cles and Rays, page 9.
Andrew, C. (1986). How to generate and exchange secrets.
In Proc. of the 27th IEEE Symposium on Foundations
of Computer Science, pages 162–167.
Bae, M. and Bose, B. (2003). Edge disjoint Hamiltonian
cycles in k-ary n-cubes and hypercubes. IEEE Trans-
actions on Computers, 52(10):1271–1284.
Baiardi, F., Falleni, A., Granchi, R., Martinelli, F., Petroc-
chi, M., and Vaccarelli, A. (2005). SEAS, a secure
e-voting protocol: design and implementation. Com-
puters & Security, 24(8):642–652.
Bottcher, S. and Obermeier, S. (2008). Secure set union and
bag union computation for guaranteeing anonymity of
distrustful participants. Journal of Software, 3(1):9.
Chaum, D. (1988). The dining cryptographers prob-
lem: Unconditional sender and recipient untraceabil-
ity. Journal of Cryptology, 1(1):65–75.
Clifton, C., Vaidya, J., Kantarcioglu, M., Lin, X., and Zhu,
M. Y. (2002). Tools for privacy preserving distributed
data mining. SIGKDD Explor. Newsl., 4(2):28–34.
Dong, R. and Kresman, R. (2009). Indirect disclosures in
data mining. In Frontier of Computer Science and
Technology, Japan-China Joint Workshop, pages 346–
350, Shanghai, China. IEEE Computer Society.
Dong, R. and Kresman, R. (2010). Proof of certain proper-
ties of edge disjoint Hamiltonian cycles. Under prepa-
ration.
Garey, M., Johnson, D., et al. (1979). Computers
and Intractability: A Guide to the Theory of NP-
completeness. W.H. freeman San Francisco.
Han, J. and Kamber, M. (2006). Data mining: concepts and
techniques. Morgan Kaufmann.
Pullan, W. and Hoos, H. (2006). Dynamic local search for
the maximum clique problem. Journal of Artificial
Intelligence Research, 25:159–185.
Schneier, B. (2007). Applied cryptography: protocols, al-
gorithms, and source code in C. A1bazaar.
Shepard, S. (2007). Anonymous Opt-Out and Secure Com-
putation in Data Mining. Master’s thesis, Bowling
Green State University, Bowling Green, OH, USA.
Stewart, I. (2007). Distributed algorithms for building
Hamiltonian cycles in k-ary n-cubes and hypercubes
with faulty links. Journal of Interconnection Net-
works, 8(3):253.
Urabe, S., Wang, J., Kodama, E., and Takata, T. (2007a).
A high collusion-resistant approach to distributed
privacy-preserving data mining. IPSJ Digital Courier,
3(0):442–455.
Urabe, S., Wong, J., Kodama, E., and Takata, T. (2007b).
A high collusion-resistant approach to distributed
privacy-preserving data mining. In Proceedings of the
25th conference on Proceedings of the 25th IASTED
International Multi-Conference: parallel and dis-
tributed computing and networks, page 331. ACTA
Press.
Verykios, V. S., Bertino, E., Fovino, I. N., Provenza, L. P.,
Saygin, Y., and Theodoridis, Y. (2004). State-of-the-
art in privacy preserving data mining. SIGMOD Rec.,
33(1):50–57.
NOTES ON PRIVACY-PRESERVING DISTRIBUTED MINING AND HAMILTONIAN CYCLES
107