2013
DOI: 10.1007/978-3-642-37682-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms

Abstract: Abstract. Sorting is one of the most important primitives in various systems, for example, database systems, since it is often the dominant operation in the running time of an entire system. Therefore, there is a long list of work on improving its efficiency. It is also true in the context of secure multi-party computation (MPC), and several MPC sorting protocols have been proposed. However, all existing MPC sorting protocols are based on less efficient sorting algorithms, and the resultant protocols are also … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(33 citation statements)
references
References 26 publications
0
33
0
Order By: Relevance
“…-Secure Sorting: Secure Sorting using MPC can be achieved by sorting networks and other data-oblivious mechanisms, including the randomize shellsort from Goodrich [16]. Moreover, Hamada et al [17] introduced a technique to facilitate the use of comparison sorting algorithms. This technique consists of randomly permuting the vector before sorting, so that the results of some of the intermediate secure comparisons can be made public.…”
Section: Preliminariesmentioning
confidence: 99%
“…-Secure Sorting: Secure Sorting using MPC can be achieved by sorting networks and other data-oblivious mechanisms, including the randomize shellsort from Goodrich [16]. Moreover, Hamada et al [17] introduced a technique to facilitate the use of comparison sorting algorithms. This technique consists of randomly permuting the vector before sorting, so that the results of some of the intermediate secure comparisons can be made public.…”
Section: Preliminariesmentioning
confidence: 99%
“…Some provide secure integer arithmetic [46,14,32,27,20,3,42], floating point arithmetic [17,26], shuffling and sorting [29] and linking [25], but, to our knowledge, only the Sharemind framework provides all the operations integrated into a single implementation [10,44,43,38,8].…”
Section: Secure Multi-party Computation With External Partiesmentioning
confidence: 99%
“…Calculating a Cox model requires first sorting the data, and then performing an iterative optimization algorithm. Secure sorting is itself a well-studied task (Jónsson et al 2011;Hamada et al 2013), and most secure sorting is based on sorting networks (Batcher 1968). Even after (securely) sorting the data, optimizing the objective function requires a relatively complex secure calculation, e.g.…”
Section: Statisticsmentioning
confidence: 99%