UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

Private Two-Party Random Minimum Spanning Forest Computation

Loading...
Thumbnail Image

Date

2022-08-30

Authors

Dietz, Marian

Journal Title

Journal ISSN

Volume Title

Publisher

University of Waterloo

Abstract

Finding the Minimum Spanning Tree, or more generally the Minimum Spanning Forest (MSF), of a weighted graph is a well-known algorithmic problem. While this problem itself can be directly applied to any kind of networks, it also has less obvious applications like the approximation of the Traveling Salesman Problem. However, there is only limited work on efficiently computing an MSF in a two-party computation setting, where the input graph is split between two parties, and the goal is to find the MSF on the combined graph without leaking any information about the parties’ respective inputs. Any prior work on this problem either follows a generic approach that builds a circuit in order to run it through a general multi-party computation protocol, or requires a high number of communication rounds (usually at least linear in the graph size). In addition, all of these approaches assume that the edge weights are unique. In this work, we are going to address these issues by first defining a lightweight and simple protocol with a low worst-case number of communication rounds, under the constraint that no two edges share the same weight. We then analyze the problems occurring after enabling the possibility of duplicated weights and look at the more general problem of generating a Random Minimum Spanning Forest, which defines a distribution of the desired output in case the MSF is not unique. We carefully design a protocol for the semi-honest security model in such a way that as many values as possible can be published in the early stages. This reveals information about the graph structure that is then used to reduce the number of communication rounds. By doing this we get a protocol that performs especially well whenever the number of identical weights is low, while it stays secure and correct regardless of the graph structure and its edge weights.

Description

Keywords

minimum spanning forests, two party computation, secure computation, graph protocols

LC Keywords

Citation