Article ID: | iaor200964567 |
Country: | United States |
Volume: | 10 |
Issue: | 1 |
Start Page Number: | 108 |
End Page Number: | 125 |
Publication Date: | Jan 2008 |
Journal: | Manufacturing & Service Operations Management |
Authors: | Iyer Ananth, Cho Richard, Clifton Chris, Jiang Wei, Kantarcolu Murat, Vaidya Jaideep |
The problem of sharing manufacturing, inventory, or capacity to improve performance is applicable in many decentralized operational contexts. However, the solution of such problems commonly requires an intermediary or a broker to manage information security concerns of individual participants. Our goal is to examine use of cryptographic techniques to attain the same result without the use of a broker. To illustrate this approach, we focus on a problem faced by independent trucking companies that have separate pick–up and delivery tasks and wish to identify potential efficiency–enhancing task swaps while limiting the information they must reveal to identify these swaps. We present an algorithm that finds opportunities to swap loads without revealing any information except the loads swapped, along with proofs of the security of the protocol. We also show that it is incentive compatible for each company to correctly follow the protocol as well as provide their true data. We apply this algorithm to an empirical data set from a large transportation company and present results that suggest significant opportunities to improve efficiency through Pareto improving swaps. This paper thus uses cryptographic arguments in an operations management problem context to show how an algorithm can be proven incentive compatible as well as demonstrate the potential value of its use on an empirical data set.