In this paper, we describe a randomized Shellsort algorithm. This algorithm is a simple, randomized, data-oblivious ver-sion of the Shellsort algorithm that always runs inO(n log n) time and succeeds in sorting any given input permutation with very high probability. Taken together, these properties imply applications in the design of new efficient privacy-preserving computations based on the secure multi-party computation (SMC) paradigm. In addition, by a trivial con-version of this Monte Carlo algorithm to its Las Vegas equiv-alent, one gets the first version of Shellsort with a running time that is provably O(n log n) with very high probability.
We consider the amount of randomness used in private distributed computations. Specifically, we show...
We address the problem of sorting a large number N of keys on a MasPar MP-1 parallel SIMD machine of...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
We describe and analyze Zig-zag Sort—a deterministic data-oblivious sorting algorithm running in O(n...
We study sorting algorithms based on randomized round-robin comparisons. Specifically, we study Spin...
A randomized encoding allows to represent a “complex” function f(x) by a “simpler” randomized functi...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We address the problem of sorting a large number N of keys on a MasPar MP-1 parallel SIMD machine of...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
In this paper we present randomized algorithms for sorting and convex hull that achieves optimal per...
We consider the amount of randomness used in private distributed computations. Specifically, we show...
We address the problem of sorting a large number N of keys on a MasPar MP-1 parallel SIMD machine of...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
We describe and analyze Zig-zag Sort—a deterministic data-oblivious sorting algorithm running in O(n...
We study sorting algorithms based on randomized round-robin comparisons. Specifically, we study Spin...
A randomized encoding allows to represent a “complex” function f(x) by a “simpler” randomized functi...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure multiparty computation (SMC) allows a set of parties to jointly compute a function on private...
We address the problem of sorting a large number N of keys on a MasPar MP-1 parallel SIMD machine of...
Abstract. In secure multi-party shuffling, multiple parties, each holding an input, want to agree on...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
In this paper we present randomized algorithms for sorting and convex hull that achieves optimal per...
We consider the amount of randomness used in private distributed computations. Specifically, we show...
We address the problem of sorting a large number N of keys on a MasPar MP-1 parallel SIMD machine of...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...