Title :
Verifiably Randomized Quick-Sort Protocols in the Presence of Malicious Adversaries
Author_Institution :
Inst. for Infocomm Res., A*STAR, Singapore, Singapore
Abstract :
The sorting protocols are applied extensively in the real-world (say, a key to the auto-partitions problem and the kthranked element problem). This paper studies random quick-sort protocols in the presence of malicious adversaries and makes the following twofold contributions. · In the first fold, a new notion which we call verifiably randomized quick-sort protocols is introduced and formalized. · In the second fold, an efficient implementation of the primitive from homomorphic commitment schemes is proposed and analyzed. We show that our implementation is provably secure assuming that the underlying homomorphic commitment scheme is statistically hiding and computationally binding in the common reference model.
Keywords :
cryptographic protocols; telecommunication security; computationally binding; homomorphic commitment schemes; malicious adversaries; sorting protocols; statistically hiding; verifiably randomized quick-sort protocols; Information science; Protocols; Sorting; k-th ranked problem; malicious adversary; quick-sort protocol;
Conference_Titel :
Information Science and Engineering (ISISE), 2009 Second International Symposium on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-6325-1
Electronic_ISBN :
978-1-4244-6326-8
DOI :
10.1109/ISISE.2009.67