tions which obviate usage (extensibility) of the plan
to a global solution. We have shown that this privacy
leakage can be arbitrarily “diluted” by randomly gen-
erated local plans, however never fully averted pro-
vided the completeness of the planning process has to
be ensured.
ACKNOWLEDGEMENTS
This research was supported by the Czech Science
Foundation (no. 15-20433Y).
REFERENCES
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988).
Completeness theorems for non-cryptographic fault-
tolerant distributed computation. In Proceedings of
the Twentieth Annual ACM Symposium on Theory of
Computing, STOC ’88, pages 1–10, New York, NY,
USA. ACM.
Brafman, R. I. (2015). A privacy preserving algorithm for
multi-agent planning and search. In Yang, Q. and
Wooldridge, M., editors, Proceedings of the Twenty-
Fourth International Joint Conference on Artificial In-
telligence, IJCAI 2015, Buenos Aires, Argentina, July
25-31, 2015, pages 1530–1536. AAAI Press.
Brafman, R. I. and Domshlak, C. (2008). From one to
many: Planning for loosely coupled multi-agent sys-
tems. In Procs. of the ICAPS’08, pages 28–35.
Diffie, W. and Hellman, M. (1976). New directions in cryp-
tography. IEEE Trans. Inf. Theor., 22(6):644–654.
Guanciale, R., Gurov, D., and Laud, P. (2014). Private inter-
section of regular languages. In Miri, A., Hengartner,
U., Huang, N., Jøsang, A., and Garc
´
ıa-Alfaro, J., ed-
itors, 2014 Twelfth Annual International Conference
on Privacy, Security and Trust, Toronto, ON, Canada,
July 23-24, 2014, pages 112–120. IEEE.
Jarecki, S. and Liu, X. (2010). Fast secure computation
of set intersection. In Garay, J. A. and Prisco, R. D.,
editors, Security and Cryptography for Networks, 7th
International Conference, SCN 2010, Amalfi, Italy,
September 13-15, 2010. Proceedings, volume 6280 of
Lecture Notes in Computer Science, pages 418–435.
Springer.
Maliah, S., Shani, G., and Brafman, R. (2016a). Online
macro generation for privacy preserving planning. In
Proceedings of the 26th International Conference on
Automated Planning and Scheduling, ICAPS’16.
Maliah, S., Shani, G., and Stern, R. (2016b). Collaborative
privacy preserving multi-agent planning. Procs. of the
AAMAS’16, pages 1–38.
Nissim, R. and Brafman, R. I. (2014). Distributed heuris-
tic forward search for multi-agent planning. JAIR,
51:293–332.
Pinkas, B., Schneider, T., Segev, G., and Zohner, M. (2015).
Phasing: Private set intersection using permutation-
based hashing. In 24th USENIX Security Symposium
(USENIX Security 15), pages 515–530, Washington,
D.C. USENIX Association.
Stolba, M., Tozicka, J., and Komenda, A. (2016). Secure
multi-agent planning algorithms. In ECAI 2016, pages
1714–1715.
Torre
˜
no, A., Onaindia, E., and Sapena, O. (2014). FMAP:
distributed cooperative multi-agent planning. AI,
41(2):606–626.
To
ˇ
zi
ˇ
cka, J., Jakub
˚
uv, J., Komenda, A., and P
ˇ
echou
ˇ
cek,
M. (2015). Privacy-concerned multiagent planning.
KAIS, pages 1–38.
Van Der Krogt, R. (2009). Quantifying privacy in mul-
tiagent planning. Multiagent and Grid Systems,
5(4):451–469.
Yao, A. C. (1982). Protocols for secure computations. In
Proceedings of the 23rd Annual Symposium on Foun-
dations of Computer Science, SFCS ’82, pages 160–
164, Washington, DC, USA. IEEE Computer Society.
Yao, A. C.-C. (1986). How to generate and exchange se-
crets. In Proceedings of the 27th Annual Sympo-
sium on Foundations of Computer Science, SFCS ’86,
pages 162–167, Washington, DC, USA. IEEE Com-
puter Society.
θt-Strong Privacy Preserving Multiagent Planner by Computational Tractability
57