Reducing the Stable Matching (SM) problem: XOR secret sharing: Example?

In summary, the paper discusses different ways of securely matching content. One way is to use Secure Function Evaluation protocols. Another way is to use a known technique based on XOR-secret-sharing.
  • #1
zak100
462
11
TL;DR Summary
Hi,
I am reading a research paper in the context of stable matching which reduces the problem. I am looking for an exampe
Hi,
I am reading the following paper:
Toward Practical Secure Stable Matching: https://encrypto.de/papers/RSSSK17.pdf.

According to the paper:

We can make the process of stable matching secure by utilizing Secure Function Evaluation (SFE) protocols.
SFE allows to evaluate a function on private inputs from multiple parties where each party wants to keep
her own inputs private.

and at other place:

Secure SM is inherently a multiparty SFE problem where multiple parties provide their inputs. However, we use
a known technique based on XOR-secret-sharing that translates this problem into two-party SFE.

Somebody please provide me an example for this model i.e reducing from multiparty data into 2-party data.

Zulfi.
 
Technology news on Phys.org
  • #2
Not sure what example might help - what are you expecting to gain from reading this paper?
 
  • #4
zak100 said:
Do you have any better idea with example?
An example of XOR secret sharing?

I have 2 sons who are traveling abroad and I want them to be able to access money on an ATM card after a month but only when they are together. I give one of them the card and the secret 8265 and the other one the secret 5467.

[Edit: terminolgy corrected]
The PIN on the card (the message) is 1234. I encrypt the message by taking 1234 ^ 8265 ^ 5467 = 12736 where ^ is the symbol for a binary XOR operation, and publish the encrypted message on the internet after a month.

When my sons are together, they XOR the encrypted message with both of their secrets (they can do this without sharing them with each other by using a tool like this one; because XOR is commutative it doesn't matter which order the secrets were applied in encryption or decryption) to retrieve the unencrypted PIN.
 
Last edited:
  • Like
Likes sysprog
  • #5
Hi,
Good idea. Can you please show me the Maths how it works (for multi-party) both for encryption and decryption?

For two party, we have one-time Pad. But how can we use one time pad for muti-party, this is what I want to now.

Zulfi.
 
  • #6
  • Like
Likes zak100
  • #7
Hi,
Thanks you are right. We already have One-time Pad. But how can we use One-time pad for multiple party this is my question.

Zulfi.
 
  • #8
This is not a 'one-time pad', the keys are reusable. I have explained multi-party use in #4.
 
  • #9
Hi,
Yes you are right one-time pad is used only one time. I am talking about multiparty in the context of stable matching. Two groups and each group has 'n' elements. Each one of the 'n' elements have preference list. I have to encrypt this data so that the other group can't see the see the matching information. The other group can decrypt the information specific to its need. I need an example for this.

Zulfi.
 
  • #10
Have you considered the examples in the paper you linked?
The National Residency Matching Program (NRMP) matches around 32k graduatingmedical students to residency programs in the US every year [23, 33]. The New York City Department of Education (NYCDOE) matches over 90k entering students to public high schools [1]. Also there are many financial applications that require SM, such as vertical networks and their application in supply chains [25].
 

1. How does XOR secret sharing reduce the Stable Matching problem?

XOR secret sharing is a method of distributing a secret among multiple parties in such a way that the secret can only be reconstructed when a predetermined number of parties come together and share their individual pieces of the secret. This approach can be applied to the Stable Matching problem by using the preference lists of the participants as the secrets to be shared.

2. Can XOR secret sharing guarantee a stable matching?

No, XOR secret sharing is not a guarantee of a stable matching. It is only a method of distributing the preference lists in a way that prevents any one individual from manipulating the matching outcome for their own benefit.

3. How does the example of XOR secret sharing apply to the Stable Matching problem?

The example of XOR secret sharing in relation to the Stable Matching problem involves distributing the preference lists of the participants among multiple parties using XOR operations. This ensures that no single party has control over the matching outcome and prevents any individual from manipulating the matching in their favor.

4. Are there any drawbacks to using XOR secret sharing for the Stable Matching problem?

One potential drawback of using XOR secret sharing is the requirement of a predetermined number of parties to come together and share their individual pieces of the secret in order to reconstruct the full preference lists and determine a matching. This may not always be feasible or practical.

5. Can XOR secret sharing be applied to other problems besides the Stable Matching problem?

Yes, XOR secret sharing can be applied to other problems that involve the distribution and reconstruction of a secret among multiple parties. This can include tasks such as secure communication, data encryption, and access control, among others.

Similar threads

  • Computing and Technology
Replies
1
Views
926
Replies
10
Views
2K
  • MATLAB, Maple, Mathematica, LaTeX
Replies
3
Views
2K
  • Special and General Relativity
Replies
13
Views
2K
  • Biology and Medical
Replies
2
Views
11K
  • MATLAB, Maple, Mathematica, LaTeX
Replies
7
Views
2K
  • MATLAB, Maple, Mathematica, LaTeX
Replies
7
Views
3K
  • Atomic and Condensed Matter
Replies
4
Views
6K
Replies
3
Views
3K
Back
Top