TY - GEN
T1 - Secure Sorting and Selection via Function Secret Sharing
AU - Agarwal, Amit
AU - Boyle, Elette
AU - Chandran, Nishanth
AU - Gilboa, Niv
AU - Gupta, Divya
AU - Ishai, Yuval
AU - Kelkar, Mahimna
AU - Ma, Yiping
N1 - Publisher Copyright: © 2024 Copyright held by the owner/author(s).
PY - 2024/12/9
Y1 - 2024/12/9
N2 - We revisit the problem of concretely efficient secure computation of sorting and selection (e.g., maximum, median, or top-k) on secret-shared data, focusing on the case of security against a single semi-honest party. Previous solutions either have a high communication overhead or many rounds of interaction, even when allowing input-independent preprocessing. We propose a suite of 2-party and 3-party offline-online protocols that exploit the efficient aggregation feature of function secret sharing to minimize the online communication and rounds. In particular, most of our protocols are optimal in terms of both online communication and online rounds up to small constant factors. We compare the performance of our protocols with prior works for different input parameters (number of items, bit length of items, batch size) and system parameters (CPU cores, network) and obtain up to 14× improvement in online run time for sorting and selection under some settings.
AB - We revisit the problem of concretely efficient secure computation of sorting and selection (e.g., maximum, median, or top-k) on secret-shared data, focusing on the case of security against a single semi-honest party. Previous solutions either have a high communication overhead or many rounds of interaction, even when allowing input-independent preprocessing. We propose a suite of 2-party and 3-party offline-online protocols that exploit the efficient aggregation feature of function secret sharing to minimize the online communication and rounds. In particular, most of our protocols are optimal in terms of both online communication and online rounds up to small constant factors. We compare the performance of our protocols with prior works for different input parameters (number of items, bit length of items, batch size) and system parameters (CPU cores, network) and obtain up to 14× improvement in online run time for sorting and selection under some settings.
KW - Function secret sharing
KW - Secure multiparty computation
KW - Secure selection
KW - Secure sorting
UR - http://www.scopus.com/inward/record.url?scp=85215501134&partnerID=8YFLogxK
U2 - 10.1145/3658644.3690359
DO - 10.1145/3658644.3690359
M3 - منشور من مؤتمر
T3 - CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
SP - 3023
EP - 3037
BT - CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
T2 - 31st ACM SIGSAC Conference on Computer and Communications Security, CCS 2024
Y2 - 14 October 2024 through 18 October 2024
ER -