会议专题

Verifiably Randomized Quick-sort Protocols In the Presence of Malicious Adversaries

The sorting protocols are applied extensively in the real-world (say, a key to the auto-partitions problem and the kth-ranked element problem). This paper studies random quick-sort protocols in the presence of malicious adversaries and makes the following twofold contributions. ·In the first fold, a new notion which we call verifiably randomized quick-sort protocols is introduced and formalized. ·In the second fold, an efficient implementation of the primitive from homomorphic commitment schemes is proposed and analyzed. We show that our implementation is provably secure assuming that the underlying homomorphic commitment scheme is statistically hiding and computationally binding in the common reference model.

Huafei Zhu

Institute for Infocomm Research, A*STAR, Singapore

国际会议

Second International Symposium on Information Science and Engineering(第二届信息科学与工程国际会议)

上海

英文

359-362

2009-12-26(万方平台首次上网日期,不代表论文的发表时间)