Secure Sorting Protocols and Their Applications
Author:
Affiliation:

Clc Number:

TP309

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    Secure multi-party computation (SMC) is a focus in the international cryptographic community in recent years. Sorting is a basic data operation and a basic problem of algorithm design and analysis. Secure multiparty sorting is the generalization of the millionaires' problem and a basic problem of SMC. It can be extensively used in scientific decision-making, e-commerce recommendation, electronic auction and bidding, anonymous voting and privacy-preserving data-mining, etc. Most existing solutions to sorting problem are applicable to the cases that the private data is known and small. If the data range is not known, they do not work. If the data range is very large, they will be very inefficient. Unfortunately, in practice, many application scenarios fall in these categories. To privately sort data in scenarios that data range is unknown or the data range is very large, two protocols are proposed first for these scenarios where the data range is small or is known to preserve the privacy of data:the scheme where the same data occupy the same order and that where the same data occupy different orders. Then, these protocols are used as building blocks to design schemes to solve the sorting problem in scenarios that data range is unknown or the data range is very large. The proposed new secure sorting protocols can be used as building blocks to solve many practical problems that inherently need sorting. Based on these protocols, a secure and efficient Vickrey auction protocol is designed. Encoding technique and threshold decryption ElGamal cryptosystem are flexibly used to design these protocols. Using the simulation paradigm, it is proved that the protocols are secure in the semi-honest model. Finally, the efficiency of the protocols are tested. The experimental results show that the proposed protocols are efficient.

    Reference
    Related
    Cited by
Get Citation

窦家维,汪榆淋.安全排序协议及其应用.软件学报,2022,33(11):4316-4333

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 31,2020
  • Revised:December 05,2020
  • Adopted:
  • Online: November 11,2022
  • Published: November 06,2022
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063