• DocumentCode
    2071392
  • Title

    Verifiably Randomized Quick-Sort Protocols in the Presence of Malicious Adversaries

  • Author

    Zhu, Huafei

  • Author_Institution
    Inst. for Infocomm Res., A*STAR, Singapore, Singapore
  • fYear
    2009
  • fDate
    26-28 Dec. 2009
  • Firstpage
    359
  • Lastpage
    362
  • Abstract
    The sorting protocols are applied extensively in the real-world (say, a key to the auto-partitions problem and the kthranked element problem). This paper studies random quick-sort protocols in the presence of malicious adversaries and makes the following twofold contributions. · In the first fold, a new notion which we call verifiably randomized quick-sort protocols is introduced and formalized. · In the second fold, an efficient implementation of the primitive from homomorphic commitment schemes is proposed and analyzed. We show that our implementation is provably secure assuming that the underlying homomorphic commitment scheme is statistically hiding and computationally binding in the common reference model.
  • Keywords
    cryptographic protocols; telecommunication security; computationally binding; homomorphic commitment schemes; malicious adversaries; sorting protocols; statistically hiding; verifiably randomized quick-sort protocols; Information science; Protocols; Sorting; k-th ranked problem; malicious adversary; quick-sort protocol;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Science and Engineering (ISISE), 2009 Second International Symposium on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-1-4244-6325-1
  • Electronic_ISBN
    978-1-4244-6326-8
  • Type

    conf

  • DOI
    10.1109/ISISE.2009.67
  • Filename
    5447230