Public Order Preserving Cipher Generation Scheme for Distributed Computing

Ordering is a widely used operation in distributed settings. However certain distributed settings like an on-line auction, place unique requirements on the protocol design. Firstly, all entities participate in the ordering with a communication channel(s) only with a coordinator(s), completely oblivious to other participants. This lack of intra-party communication channels makes traditional secure multi-party computations unsuitable for this scenario. Secondly, the security and functionality of the protocol should not depend on a single piece of secret information such as a secret symmetric key, ( as in the case of order-preserving encryption, OPE ). It is so because now every participating entity has to be communicated the secret key in order for them to encrypt their private data. However this means that even if just one of the entities is corrupt, the security of all the honest entities is compromised. These restrictions render both SMPC and OPE ill-suited for the above distributed setting. In this paper we propose a public order-preserving cipher generation scheme (POPC) that addresses the aforementioned challenges. POPC encodes a transform of the plaintext using a public order-preserving probabilistic encoding and generates the cipher in a two round interactive protocol. In POPC neither the correctness nor the security of the scheme depends on the possession of a single secret key. Moreover POPC needs no intra-party communication for its execution. We show POPC achieves the ideal security guarantee for any total order-preserving scheme, which is to reveal no information about the plaintexts beside the order, with a ciphertext space that is polynomial in size of the plaintext.

[1]  David Evans,et al.  Obliv-C: A Language for Extensible Data-Oblivious Computation , 2015, IACR Cryptol. ePrint Arch..

[2]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  C. Martin 2015 , 2015, Les 25 ans de l’OMC: Une rétrospective en photos.

[5]  Nickolai Zeldovich,et al.  An Ideal-Security Protocol for Order-Preserving Encoding , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Ivan Damgård,et al.  Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[7]  A. Azzouz 2011 , 2020, City.

[8]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..