{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:09:59Z","timestamp":1762409399188,"version":"3.41.2"},"reference-count":37,"publisher":"ASME International","issue":"2","content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,1]]},"abstract":"<jats:p>Information leakage can lead to loss of intellectual property and competitive edge. One of the primary sources of information leakage in collaborative design is sharing confidential information with collaborators, who may be also collaborating with competitors. Hiding information from collaborators is challenging in codesign because it can lead to inferior and suboptimal solutions. Therefore, there is a need for techniques that enable designers to protect confidential information from their collaborators while achieving solutions that are as good as those obtained when full information is shared. To address this need, we propose a secure codesign (SCD) framework that enables designers to achieve optimal solutions without sharing confidential information. It is built on two principles: adding\/multiplying a parameter with a large random number hides the value of the parameter, and adding\/multiplying a large number is orders of magnitude faster than using existing cryptographic techniques. Building on the protocols for basic arithmetic computations, developed in our earlier work, we establish protocols for higher order computations involved in design problems. The framework is demonstrated using three codesign scenarios: requirements-driven codesign, objective-driven codesign, and Nash noncooperation. We show that the proposed SCD framework enables designers to achieve optimal solutions in all three scenarios. The proposed framework is orders of magnitude faster than competing (but impractical for engineering design) cryptographic methods such as homomorphic encryption, without compromising on precision in computations. Hence, the proposed SCD framework is a practical approach for maintaining confidentiality of information during codesign.<\/jats:p>","DOI":"10.1115\/1.4039431","type":"journal-article","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T22:31:29Z","timestamp":1521585089000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":3,"title":["Secure Codesign: Achieving Optimality Without Revealing"],"prefix":"10.1115","volume":"18","author":[{"given":"Siva","family":"Chaitanya Chaduvula","sequence":"first","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Computer Science, Purdue University, West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"volume-title":"Product Design and Development","year":"2003","key":"2019100601594893200_bib1"},{"volume-title":"UGS Connection Americas","year":"2008","key":"2019100601594893200_bib2"},{"volume-title":"When Your Contract Manufacturer Becomes Your Competitor","year":"2006","key":"2019100601594893200_bib3"},{"issue":"8","key":"2019100601594893200_bib4","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.2514\/2.248","article-title":"Modeling Interactions in Multidisciplinary Design: A Game Theoretic Approach","volume":"35","year":"1997","journal-title":"AIAA J."},{"issue":"1","key":"2019100601594893200_bib5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1115\/1.2161226","article-title":"Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD","volume":"6","year":"2005","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"2","key":"2019100601594893200_bib6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1115\/1.2190235","article-title":"Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing","volume":"6","year":"2006","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"9","key":"2019100601594893200_bib7","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.cad.2003.09.014","article-title":"Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling","volume":"36","year":"2004","journal-title":"Comput.-Aided Des."},{"issue":"5","key":"2019100601594893200_bib8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-Anonymity Privacy Protection Using Generalization and Suppression","volume":"10","year":"2002","journal-title":"Int. J. Uncertainty, Fuzziness Knowl.-Based Syst."},{"issue":"3","key":"2019100601594893200_bib9","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.compind.2010.10.002","article-title":"Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains","volume":"62","year":"2011","journal-title":"Comput. Ind."},{"key":"2019100601594893200_bib10","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Bettini, C., Freni, D., Wang, X. S., and Jajodia, S., 2009, \u201cPrivacy-Aware Proximity Based Services,\u201d Tenth International Conference on Mobile Data Management: Systems, Services and Middleware (MDM'09), Taipei, Taiwan, May 18\u201320, pp. 31\u201340.10.1109\/MDM.2009.14","DOI":"10.1109\/MDM.2009.14"},{"issue":"3","key":"2019100601594893200_bib11","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1177\/1063293X07083083","article-title":"An Interval-Based Constraint Satisfaction (IBCS) Method for Decentralized, Collaborative Multifunctional Design","volume":"15","year":"2007","journal-title":"Concurrent Eng."},{"issue":"2","key":"2019100601594893200_bib12","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/17.509982","article-title":"Involving Suppliers in Product Development in the United States and Japan: Evidence for Set-Based Concurrent Engineering","volume":"43","year":"1996","journal-title":"IEEE Trans. Eng. Manage."},{"key":"2019100601594893200_bib13","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/1-84628-210-1_23","article-title":"Federated Product Data Management in Multi-Company Projects","volume-title":"Advances in Design","year":"2006"},{"key":"2019100601594893200_bib14"},{"key":"2019100601594893200_bib15","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Seb\u00e9, F., and Castella-Roca, J., 2004, \u201cOn the Security of Noise Addition for Privacy in Statistical Databases,\u201d International Workshop on Privacy in Statistical Databases, Barcelona, Spain, June 9\u201311, pp. 149\u2013161.","DOI":"10.1007\/978-3-540-25955-8_12"},{"issue":"1","key":"2019100601594893200_bib16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.ejor.2010.08.018","article-title":"Secure Collaborative Supply Chain Planning and Inverse Optimization\u2013The Jels Model","volume":"208","year":"2011","journal-title":"Eur. J. Oper. Res."},{"issue":"1\u20132","key":"2019100601594893200_bib17","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00170-004-2262-9","article-title":"A Design Chain Collaboration Framework Using Reference Models","volume":"26","year":"2005","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"2019100601594893200_bib18","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/978-1-84882-762-2_13","article-title":"Conceptual Modeling of Design Chain Management Towards Product Lifecycle Management","volume-title":"Global Perspective for Competitive Enterprise, Economy and Ecology","year":"2009"},{"key":"2019100601594893200_bib19","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-011-0607-4","article-title":"Formalization of Design Chain Management Using Environment-Based Design (EBD) Theory","volume":"24","year":"2013","journal-title":"J. Intell. Manuf."},{"issue":"1","key":"2019100601594893200_bib20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5465\/amr.2008.0270","article-title":"Designing Effective Contracts: Exploring the Influence of Framing and Expectations","volume":"36","year":"2011","journal-title":"Acad. Manage. Rev."},{"key":"2019100601594893200_bib21","doi-asserted-by":"crossref","unstructured":"Blakley, G. R., 1979, \u201cSafeguarding Cryptographic Keys,\u201d National Computer Conference, New York, June 4\u20137, pp. 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"volume-title":"Handbook of Applied Cryptography","year":"1996","key":"2019100601594893200_bib22"},{"issue":"21","key":"2019100601594893200_bib23","doi-asserted-by":"publisher","first-page":"4696","DOI":"10.1016\/j.ins.2007.05.011","article-title":"A Multiple-Level Visual Secret-Sharing Scheme Without Image Size Expansion","volume":"177","year":"2007","journal-title":"Inf. Sci."},{"issue":"3","key":"2019100601594893200_bib24","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/S0010-4485(03)00094-0","article-title":"A Cellular Topology-Based Approach to Generating Progressive Solid Models From Feature-Centric Models","volume":"36","year":"2004","journal-title":"Comput.-Aided Des."},{"issue":"9","key":"2019100601594893200_bib25","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1016\/j.cad.2004.09.021","article-title":"A CAD\u2013CAE Integration Approach Using Feature-Based Multi-Resolution and Multi-Abstraction Modelling Techniques","volume":"37","year":"2005","journal-title":"Comput.-Aided Des."},{"key":"2019100601594893200_bib26","doi-asserted-by":"crossref","unstructured":"Cai, X., He, F., Li, W., Li, X., and Wu, Y., 2013, \u201cMulti-Granularity Partial Encryption Method of Cad Model,\u201d 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Whistler, BC, Canada, June 27\u201329, pp. 23\u201330.10.1109\/CSCWD.2013.6580934","DOI":"10.1109\/CSCWD.2013.6580934"},{"key":"2019100601594893200_bib27","unstructured":"Atallah, M., Blanton, M., Deshpande, V., Frikken, K., Li, J., and Schwarz, L., 2006. \u201cSecure Collaborative Planning, Forecasting, and Replenishment (Scpfr),\u201d Multi-Echelon\/Public Applications of Supply Chain Management Conference, pp. 165\u2013180."},{"issue":"4","key":"2019100601594893200_bib28","doi-asserted-by":"publisher","first-page":"041010","DOI":"10.1115\/1.4036615","article-title":"Secure Collaboration in Engineering Systems Design","volume":"17","year":"2017","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2019100601594893200_bib29","doi-asserted-by":"crossref","unstructured":"Wang, S., Nassar, M., Atallah, M. J., and Malluhi, Q. M., 2013, \u201cSecure and Private Outsourcing of Shape-Based Feature Extraction,\u201d International Conference on Information and Communication Systems, Beijing, China, Nov. 20\u201322, pp. 90\u201399.","DOI":"10.1007\/978-3-319-02726-5_7"},{"issue":"9","key":"2019100601594893200_bib30","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.2514\/1.J051895","article-title":"Multidisciplinary Design Optimization: A Survey of Architectures","volume":"51","year":"2013","journal-title":"AIAA J."},{"key":"2019100601594893200_bib31","doi-asserted-by":"publisher","DOI":"10.1115\/1.2829327","article-title":"Collaborative, Sequential, and Isolated Decisions in Design","volume":"120","journal-title":"ASME J. Mech. Des."},{"volume-title":"Structural Optimization: Volume 2: Mathematical Programming","year":"1990","key":"2019100601594893200_bib32"},{"volume-title":"Engineering Optimization: Theory and Practice","year":"2009","key":"2019100601594893200_bib33"},{"volume-title":"Geometric Programming: Theory and Application","year":"1967","key":"2019100601594893200_bib34"},{"issue":"2","key":"2019100601594893200_bib35","first-page":"47","article-title":"A Method for Interactive Decision-Making in Collaborative, Distributed Engineering Design","volume":"5","year":"2002","journal-title":"Int. J. Agile Manuf. Syst."},{"volume-title":"A Friendly Introduction to Numerical Analysis","year":"2006","key":"2019100601594893200_bib36"},{"key":"2019100601594893200_bib37","doi-asserted-by":"crossref","unstructured":"Paillier, P., 1999, \u201cPublic-Key Cryptosystems Based on Composite Degree Residuosity Classes,\u201d International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, May 2\u20136, pp. 223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4039431\/6102227\/jcise_018_02_021007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4039431\/6102227\/jcise_018_02_021007.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T05:59:57Z","timestamp":1570341597000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/doi\/10.1115\/1.4039431\/371594\/Secure-Codesign-Achieving-Optimality-Without"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4039431","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"type":"print","value":"1530-9827"},{"type":"electronic","value":"1944-7078"}],"subject":[],"published":{"date-parts":[[2018,3,16]]},"article-number":"021007"}}