TY - GEN
T1 - Bureaucratic protocols for secure two-party sorting, selection, and permuting
AU - Wang, Guan
AU - Luo, Tongbo
AU - Goodrich, Michael T.
AU - Du, Wenliang
AU - Zhu, Zutao
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P computations for sorting, selection, and random permutation. In a nutshell, the main idea behind bureaucratic computing is to design data-oblivious algorithms that push all knowledge and influence of input values down to small black-box circuits, which are simulated using Yao's garbled paradigm. The practical benefit of this approach is that it maintains the zero-knowledge features of secure two-party computations while avoiding the significant computational overheads that come from trying to apply Yao's garbled paradigm to anything other than simple two-input functions.
AB - In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P computations for sorting, selection, and random permutation. In a nutshell, the main idea behind bureaucratic computing is to design data-oblivious algorithms that push all knowledge and influence of input values down to small black-box circuits, which are simulated using Yao's garbled paradigm. The practical benefit of this approach is that it maintains the zero-knowledge features of secure two-party computations while avoiding the significant computational overheads that come from trying to apply Yao's garbled paradigm to anything other than simple two-input functions.
KW - bureaucratic protocols
KW - oblivious algorithms
KW - secure two-party computation
KW - sorting
UR - http://www.scopus.com/inward/record.url?scp=77954519783&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954519783&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755716
DO - 10.1145/1755688.1755716
M3 - Conference contribution
AN - SCOPUS:77954519783
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 226
EP - 237
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -