| dc.contributor.author | Agarwal, Amit | |
| dc.contributor.author | Boyle, Elette | |
| dc.contributor.author | Chandran, Nishanth | |
| dc.contributor.author | Gilboa, Niv | |
| dc.contributor.author | Gupta, Divya | |
| dc.contributor.author | Ishai, Yuval | |
| dc.contributor.author | Kelkar, Mahimna | |
| dc.contributor.author | Ma, Yiping | |
| dc.date.accessioned | 2025-01-28T15:01:23Z | |
| dc.date.available | 2025-01-28T15:01:23Z | |
| dc.date.issued | 2024-12-02 | |
| dc.identifier.isbn | 979-8-4007-0636-3 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/158087 | |
| dc.description | CCS ’24, October 14–18, 2024, Salt Lake City, UT, USA | en_US |
| dc.description.abstract | We revisit the problem of concretely efficient secure computation of sorting and selection (e.g., maximum, median, or top-k) on secret-shared data, focusing on the case of security against a single semi-honest party. Previous solutions either have a high communication overhead or many rounds of interaction, even when allowing input-independent preprocessing.
We propose a suite of 2-party and 3-party offline-online protocols that exploit the efficient aggregation feature of function secret sharing to minimize the online communication and rounds. In particular, most of our protocols are optimal in terms of both online communication and online rounds up to small constant factors.
We compare the performance of our protocols with prior works for different input parameters (number of items, bit length of items, batch size) and system parameters (CPU cores, network) and obtain up to 14x improvement in online run time for sorting and selection under some settings. | en_US |
| dc.publisher | ACM|Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security | en_US |
| dc.relation.isversionof | https://doi.org/10.1145/3658644.3690359 | en_US |
| dc.rights | Creative Commons Attribution | en_US |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | en_US |
| dc.source | Association for Computing Machinery | en_US |
| dc.title | Secure Sorting and Selection via Function Secret Sharing | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Agarwal, Amit, Boyle, Elette, Chandran, Nishanth, Gilboa, Niv, Gupta, Divya et al. 2024. "Secure Sorting and Selection via Function Secret Sharing." | |
| dc.identifier.mitlicense | PUBLISHER_CC | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2025-01-01T08:49:50Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2025-01-01T08:49:50Z | |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |