|Table of Contents|

[1] Xie Cuihua, Zhong Weijun, Zhang Yulin,. Privacy preserving supply chain quantity discount contract design [J]. Journal of Southeast University (English Edition), 2009, 25 (1): 132-137. [doi:10.3969/j.issn.1003-7985.2009.01.028]
Copy

Privacy preserving supply chain quantity discount contract design()
Share:

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

Volumn:
25
Issue:
2009 1
Page:
132-137
Research Field:
Economy and Management
Publishing date:
2009-03-30

Info

Title:
Privacy preserving supply chain quantity discount contract design
Author(s):
Xie Cuihua Zhong Weijun Zhang Yulin
School of Economics and Management, Southeast University, Nanjing 211189, China
Keywords:
supply chain quantity discount privacy preserving
PACS:
C931
DOI:
10.3969/j.issn.1003-7985.2009.01.028
Abstract:
The development and deployment of privary preserving supply chain quantity discount contract design can allow supply chain collaborations to take place without revealing any participant’s data to others, reaping the benefits of collaborations while avoiding the drawbacks of privacy information disclosure.First, secure multi-party computation protocols are applied in the joint-ordering policy between a single supplier and a single retailer, the joint-ordering policy can be conducted without disclosing private cost information of any of the other supply chain partners. Secondly, secure multi-party computation protocols are applied in the privacy preserving supply chain quantity discount contract design between a single supplier and a single retailer.The information disclosure analyses of the algorithm show that:the optimal quantity discount of the joint-ordering policy can be conducted without disclosing private cost information of any of the other supply chain partners;the above protocol can be implemented without mediators;the privacy preserving quantity discount algorithm can be mutually verifiable and has solved the problem of asymmetric information.

References:

[1] Kohli R, Park H A.Cooperative game theory model and quantity discounts [J].Management Sci, 1989, 35(6):693-707.
[2] Dolan R J.A normative model of industrial buyer response to quantity discounts[C]//Research Frontiers in Marketing:Dialogues and Directions.Chicago:American Marketing Association, 1978:121-125.
[3] Lal R, Staelin R.An approach for developing an optimal discounts pricing policy [J].Management Sci, 1984, 30(12):1524-1539.
[4] Dada M, Srkanth K N.Pricing policies for quantity discounts [J].Management Sci, 1987, 33(10):1247-1252.
[5] Lee H L, Whang S.Information sharing in a supply chain [J].Int J Tech Management, 2000, 20(3):373-387.
[6] Yao A.Protocols for secure computations [C]//The 23rd Annual Symp on the Foundations of Computer Science.Chicago, 1982:160-164.
[7] Goldreich O.Secure multi-party computation [EB/OL].(2006-08-06)[2008-04-30].http://www.wisdom.weizmann.ac.il/~oded/pp.html.
[8] Atallah M J.Elmongui H G, Deshpande V, et al.Secure supply chain protocols [C]//IEEE International Conference on Electronic Commerce.Newport Beach, California, USA, 2003:293-302.
[9] Harris F W.How many parts to make at once [J].Factory, the Magazine of Management, 1913, 10(2):135-136;152.
[10] Peng Zuohe, Tian Peng.Supply chain quantity discount contract design under perfect information [J].Journal of Industrial Engineering and Engineering Management, 2006, 20(2):114-116.(in Chinese)
[11] Atallah M J, Du W L.Secure multiparty computational geometry [C]//WADS2001:Seventh International Workshop on Algorithm and Data Structures.Providence, Rhode Island, USA, 2001:165-179.
[12] Du W L.A study of several specific secure two party computation problems [D].West Lafayette: Purdue University, 2001.
[13] Du W L, Atallah M J.Privacy preserving cooperative statistical analysis [C]//Annual Computer Security Applications Conference.New Orleans, Louisiana, USA, 2001:102-110.
[14] Luo Wenjun, Li Xiang.A study of secure multi-party statistical analysis [C]//Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing.Shanghai, China, 2003:377-383.
[15] Luo Wenjun, Li Xiang.A study of secure multi-patty elementary function computation protocols [C]//Proceedings of the Third International Conference on Information Security(Infosecu’04).Shanghai, China, 2004:5-12.
[16] Li Shundong, Dai Yiqi, You Qiyou.An efficient solution to Yao’s millionaires’ problem [J].Acta Electronica Sinica, 2005, 33(5):769-773.(in Chinese)

Memo

Memo:
Biographies: Xie Cuihua(1979—), male, graduate;Zhang Yulin(corresponding author), male, doctor, professor, zhangyl@seu.edu.cn.
Foundation item: The National Natural Science Foundation of China(No.70771026).
Citation: Xie Cuihua, Zhong Weijun, Zhang Yulin.Privacy preserving supply chain quantity discount contract design[J].Journal of Southeast University(English Edition), 2009, 25(1):132-137.
Last Update: 2009-03-20