391

How to Securely Shuffle? A survey about Secure Shufflers for privacy-preserving computations

Main:27 Pages
8 Figures
Bibliography:8 Pages
3 Tables
Abstract

Ishai et al. (FOCS'06) introduced secure shuffling as an efficient building block for private data aggregation. Recently, the field of differential privacy has revived interest in secure shufflers by highlighting the privacy amplification they can provide in various computations. Although several works argue for the utility of secure shufflers, they often treat them as black boxes; overlooking the practical vulnerabilities and performance trade-offs of existing implementations. This leaves a central question open: what makes a good secure shuffler?

View on arXiv
Comments on this paper