scispace - formally typeset
Book ChapterDOI

Practically efficient multi-party sorting protocols from comparison sort algorithms

Reads0
Chats0
TLDR
This work proposes a simple and general approach of converting non-data-oblivious comparison sort algorithms, which include the above algorithms, into corresponding MPC protocols, and constructs an MPC sorting protocol from the well known efficient sorting algorithm, quicksort.
Abstract
Sorting is one of the most important primitives in various systems, for example, database systems, since it is often the dominant operation in the running time of an entire system Therefore, there is a long list of work on improving its efficiency It is also true in the context of secure multi-party computation (MPC), and several MPC sorting protocols have been proposed However, all existing MPC sorting protocols are based on less efficient sorting algorithms, and the resultant protocols are also inefficient This is because only a method for converting data-oblivious algorithms to corresponding MPC protocols is known, despite the fact that most efficient sorting algorithms such as quicksort and merge sort are not data-oblivious We propose a simple and general approach of converting non-data-oblivious comparison sort algorithms, which include the above algorithms, into corresponding MPC protocols We then construct an MPC sorting protocol from the well known efficient sorting algorithm, quicksort, with our approach The resultant protocol is practically efficient since it significantly improved the running time compared to existing protocols in experiments

read more

Citations
More filters
Book ChapterDOI

CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin

TL;DR: CoinShuffle is a completely decentralized Bitcoin mixing protocol that allows users to utilize Bitcoin in a truly anonymous manner and it does not require any trusted, accountable or untrusted third party and it is perfectly compatible with the current Bitcoin system.
Proceedings ArticleDOI

Privacy-preserving matrix factorization

TL;DR: This work shows that a recommender can profile items without ever learning the ratings users provide, or even which items they have rated, by designing a system that performs matrix factorization, a popular method used in a variety of modern recommendation systems, through a cryptographic technique known as garbled circuits.
Proceedings Article

MCMix: Anonymous Messaging via Secure Multiparty Computation

TL;DR: MCMix is presented, an anonymous messaging system that completely hides communication metadata and can scale in the order of hundreds of thousands of users, illustrating how MPC is a viable and competitive alternative to mix-nets and DC-nets for anonymous communication.
Book ChapterDOI

A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation

TL;DR: This paper improves two earlier designs based on sorting networks and quicksort with the capability of sorting matrices and proposes two new designs—a naive comparison-based sort with a low round count and an oblivious radix sort algorithm that does not require any private comparisons.
Posted Content

Secure and Privacy-Friendly Local Electricity Trading and Billing in Smart Grid.

TL;DR: The results show that the trading protocol can be performed for 2500 bids in less than five minutes in the on-line phase, showing its feasibility for a typical electricity trading period of 30 minutes.
References
More filters
Book

Introduction to Algorithms

TL;DR: The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures and presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Proceedings ArticleDOI

Sorting networks and their applications

TL;DR: To achieve high throughput rates today's computers perform several operations simultaneously; not only are I/O operations performed concurrently with computing, but also, in multiprocessors, several computing operations are done concurrently.
Related Papers (5)