2021
DOI: 10.3390/cryptography5040027
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Privacy-Preserving Shortest Path Algorithms

Abstract: In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorithms—Bellman–Ford and Dijkstra for SSSD; Johnson, Floyd–Warshall, and transitive closure for APSD. As the computational platforms offered by SMC protocol sets have performance profiles that differ from typical processors, we had to perform extensive changes to the st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 56 publications
0
9
0
Order By: Relevance
“…The privacy-preserving Bellman-Ford protocol is more efficient then its versions 1 and 2 in [1] on SMC sharemind platform. The computation of public edges's version has the lowest round complexity among the computation parties of the sharemind because of using the public edges.…”
Section: Experiments Of Bellman-formmentioning
confidence: 99%
See 4 more Smart Citations
“…The privacy-preserving Bellman-Ford protocol is more efficient then its versions 1 and 2 in [1] on SMC sharemind platform. The computation of public edges's version has the lowest round complexity among the computation parties of the sharemind because of using the public edges.…”
Section: Experiments Of Bellman-formmentioning
confidence: 99%
“…This computation can be done in the same algorithmic structure as the Floyd-Warshall algorithm with some changes based on the semiring framework ⊕. Thereby, we use the parallel version of the Floyd-Warshall algorithm presented in Algorithm 8 in [1] to perform this computation. It is important to note that this algorithm performs the computation on one adjacency matrix.…”
Section: Block Diagonal Matrixmentioning
confidence: 99%
See 3 more Smart Citations