Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Com 2007
DOI: 10.1109/snpd.2007.367
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Secure Multi-party Ranking Problem

Abstract: In this paper, we study a secure multi-party ranking problem: there are n parties, P 1 , P 2 , ..., P n . Each party P i has a secret input m i ∈ {1, 2, ..., N }. He wants to get the order of m i in the ascending ranking sequence of the n parties' inputs, while not leaking the value of m i . This problem extends the famous Yao's Millionaires' problem form two paries to n parties and is a multi-party Yao's Millionaires' problem. We propose a protocol for solving the secure multi-party ranking problem, using the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…We make an experiment to compare SMRP with the protocol of Wen Liu [10]. We mainly consider the operation time of the two protocols.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…We make an experiment to compare SMRP with the protocol of Wen Liu [10]. We mainly consider the operation time of the two protocols.…”
Section: Methodsmentioning
confidence: 99%
“…After that, many special protocols were proposed for SMC [6][7][8][9]. So this paper investigates a specific SMC problem which is called Secure Multi-Party Ranking problem (SMR) [10]. It is extended from Yao' Millionaires' problem [11].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Those issues can be tackled with SMC protocols. Numerous variants have been proposed in the last decades, among them generic ones [3][4][5][6] as well as protocols tailored for specific scenarios [7][8][9]. The work by Kerschbaum et al [10][11][12] is especially focused on privacypreserving benchmarking between (mutually distrustful) organisations.…”
Section: Related Workmentioning
confidence: 99%