Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky
{"title":"加性同态加密的线性时间二部分安全合并","authors":"Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky","doi":"10.1016/j.jcss.2023.04.007","DOIUrl":null,"url":null,"abstract":"<div><p>We present a linear-time, space and communication <em>data-oblivious</em> algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the <em>two</em> party setting. Although merging two sorted lists can be done <em>insecurely</em> in linear time, previous <em>secure</em> merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to <em>obliviously</em> traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 37-49"},"PeriodicalIF":1.1000,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Linear-time 2-party secure merge from additively homomorphic encryption\",\"authors\":\"Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky\",\"doi\":\"10.1016/j.jcss.2023.04.007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>We present a linear-time, space and communication <em>data-oblivious</em> algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the <em>two</em> party setting. Although merging two sorted lists can be done <em>insecurely</em> in linear time, previous <em>secure</em> merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to <em>obliviously</em> traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.</p></div>\",\"PeriodicalId\":50224,\"journal\":{\"name\":\"Journal of Computer and System Sciences\",\"volume\":\"137 \",\"pages\":\"Pages 37-49\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2023-05-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer and System Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S002200002300048X\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"BUSINESS, FINANCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer and System Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S002200002300048X","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS, FINANCE","Score":null,"Total":0}
Linear-time 2-party secure merge from additively homomorphic encryption
We present a linear-time, space and communication data-oblivious algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the two party setting. Although merging two sorted lists can be done insecurely in linear time, previous secure merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to obliviously traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.
期刊介绍:
The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions.
Research areas include traditional subjects such as:
• Theory of algorithms and computability
• Formal languages
• Automata theory
Contemporary subjects such as:
• Complexity theory
• Algorithmic Complexity
• Parallel & distributed computing
• Computer networks
• Neural networks
• Computational learning theory
• Database theory & practice
• Computer modeling of complex systems
• Security and Privacy.