DocumentCode
2071392
Title
Verifiably Randomized Quick-Sort Protocols in the Presence of Malicious Adversaries
Author
Zhu, Huafei
Author_Institution
Inst. for Infocomm Res., A*STAR, Singapore, Singapore
fYear
2009
fDate
26-28 Dec. 2009
Firstpage
359
Lastpage
362
Abstract
The sorting protocols are applied extensively in the real-world (say, a key to the auto-partitions problem and the kthranked element problem). This paper studies random quick-sort protocols in the presence of malicious adversaries and makes the following twofold contributions. · In the first fold, a new notion which we call verifiably randomized quick-sort protocols is introduced and formalized. · In the second fold, an efficient implementation of the primitive from homomorphic commitment schemes is proposed and analyzed. We show that our implementation is provably secure assuming that the underlying homomorphic commitment scheme is statistically hiding and computationally binding in the common reference model.
Keywords
cryptographic protocols; telecommunication security; computationally binding; homomorphic commitment schemes; malicious adversaries; sorting protocols; statistically hiding; verifiably randomized quick-sort protocols; Information science; Protocols; Sorting; k-th ranked problem; malicious adversary; quick-sort protocol;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Science and Engineering (ISISE), 2009 Second International Symposium on
Conference_Location
Shanghai
Print_ISBN
978-1-4244-6325-1
Electronic_ISBN
978-1-4244-6326-8
Type
conf
DOI
10.1109/ISISE.2009.67
Filename
5447230
Link To Document