How to Securely Shuffle? A survey about Secure Shufflers for privacy-preserving computations
- FedML
Main:27 Pages
8 Figures
Bibliography:8 Pages
3 Tables
Abstract
Ishai et al. (FOCS'06) introduced secure shuffling as an efficient building block for private data aggregation. Recently, the field of differential privacy has revived interest in secure shufflers by highlighting the privacy amplification they can provide in various computations. Although several works argue for the utility of secure shufflers, they often treat them as black boxes; overlooking the practical vulnerabilities and performance trade-offs of existing implementations. This leaves a central question open: what makes a good secure shuffler?
View on arXivComments on this paper
