Abstract
With the large amount of data generated nowadays, analysis of this data has become eminent. Since a vast amount of this data is private, it is also important that the analysis is done in a secure manner. Comparison-based functions are commonly used in data analysis. These functions use the comparison operation as the basis. Secure computation of such functions have been discussed for median by Aggarwal et al. (EUROCRYPT’04) and for convex hull by Shelat and Venkitasubramaniam (ASIACRYPT’15). In this paper, we present a generic protocol for the secure computation of comparison-based functions. In order to scale to a large number of participants, we propose this protocol in a star topology with an aim to reduce the communication complexity. We also present a protocol for one specific comparison-based function, the kt h ranked element. The construction of one of our protocols leaks some intermediate values but does not reveal information about an individual party’s inputs. We demonstrate that our protocol offers better performance than the protocol for kt h ranked element by Tueno et. al. (FC’20) by providing an implementation.
Original language | English |
---|---|
Title of host publication | SECRYPT 2022 - Proceedings of the 19th International Conference on Security and Cryptography |
Editors | Sabrina De Capitani di Vimercati, Pierangela Samarati |
Publisher | Science and Technology Publications, Lda |
Pages | 69-82 |
Number of pages | 14 |
ISBN (Print) | 9789897585906 |
DOIs | |
State | Published - 2022 |
Event | 19th International Conference on Security and Cryptography, SECRYPT 2022 - Lisbon, Portugal Duration: 11 Jul 2022 → 13 Jul 2022 |
Publication series
Name | Proceedings of the International Conference on Security and Cryptography |
---|---|
Volume | 1 |
ISSN (Print) | 2184-7711 |
Conference
Conference | 19th International Conference on Security and Cryptography, SECRYPT 2022 |
---|---|
Country/Territory | Portugal |
City | Lisbon |
Period | 11/07/22 → 13/07/22 |
Bibliographical note
Publisher Copyright:© 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved.
Funding
This project was also supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cy-ber Bureau in the Prime Minister’s Office, and by ISF grant No. 1316/18. This project received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation program (grant agreement No. 850990 PSOTI). It was co-funded by the Deutsche Forschungsgemeinschaft (DFG) within SFB 1119 CROSSING/236615297 and GRK 2050 Privacy & Trust/251805230, and by the German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts within ATHENE.
Funders | Funder number |
---|---|
Israel National Cy-ber Bureau in the Prime Minister’s Office | |
Horizon 2020 Framework Programme | 850990 PSOTI |
European Commission | |
Deutsche Forschungsgemeinschaft | Trust/251805230, SFB 1119 CROSSING/236615297 |
Bundesministerium für Bildung und Forschung | |
Hessisches Ministerium für Wissenschaft und Kunst | |
Israel Science Foundation | 1316/18 |
Keywords
- K Ranked Element
- Optimisation Problems
- Scheduling Problems
- Secure Multi-party Computation