Reducing the Stable Matching (SM) problem: XOR secret sharing: Example?

  • Thread starter Thread starter zak100
  • Start date Start date
  • Tags Tags
    Example Stable
Click For Summary

Discussion Overview

The discussion revolves around the application of XOR secret sharing in the context of reducing the Stable Matching (SM) problem to a two-party secure function evaluation (SFE) scenario. Participants explore the theoretical underpinnings and practical examples of implementing secure stable matching through cryptographic techniques, particularly focusing on multiparty data reduction.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant references a paper discussing the use of SFE protocols to secure the stable matching process, highlighting the transition from multiparty to two-party SFE using XOR-secret-sharing.
  • Another participant questions the specific example needed to illustrate the reduction from multiparty data to two-party data.
  • A participant provides a personal example involving two sons and an ATM card to illustrate XOR secret sharing, detailing the encryption and decryption process using binary XOR operations.
  • There is a request for mathematical clarification on how XOR secret sharing can be applied in a multiparty context, particularly in relation to the one-time pad.
  • One participant asserts that the keys used in their example are reusable, distinguishing it from a one-time pad, while another participant emphasizes the need for a clear example of multiparty encryption related to stable matching.
  • A later reply suggests considering examples from the referenced paper, mentioning real-world applications such as the National Residency Matching Program and educational matching systems.

Areas of Agreement / Disagreement

Participants express differing views on the application of one-time pads in multiparty contexts and the specifics of XOR secret sharing. There is no consensus on a clear example that satisfies all participants' inquiries.

Contextual Notes

Participants have not fully resolved the mathematical steps or the definitions of terms like "one-time pad" in the context of multiparty encryption. The discussion remains open to interpretation and further exploration.

zak100
Messages
462
Reaction score
11
TL;DR
Hi,
I am reading a research paper in the context of stable matching which reduces the problem. I am looking for an exampe
Hi,
I am reading the following paper:
Toward Practical Secure Stable Matching: https://encrypto.de/papers/RSSSK17.pdf.

According to the paper:

We can make the process of stable matching secure by utilizing Secure Function Evaluation (SFE) protocols.
SFE allows to evaluate a function on private inputs from multiple parties where each party wants to keep
her own inputs private.

and at other place:

Secure SM is inherently a multiparty SFE problem where multiple parties provide their inputs. However, we use
a known technique based on XOR-secret-sharing that translates this problem into two-party SFE.

Somebody please provide me an example for this model i.e reducing from multiparty data into 2-party data.

Zulfi.
 
Technology news on Phys.org
Not sure what example might help - what are you expecting to gain from reading this paper?
 
zak100 said:
Do you have any better idea with example?
An example of XOR secret sharing?

I have 2 sons who are traveling abroad and I want them to be able to access money on an ATM card after a month but only when they are together. I give one of them the card and the secret 8265 and the other one the secret 5467.

[Edit: terminolgy corrected]
The PIN on the card (the message) is 1234. I encrypt the message by taking 1234 ^ 8265 ^ 5467 = 12736 where ^ is the symbol for a binary XOR operation, and publish the encrypted message on the internet after a month.

When my sons are together, they XOR the encrypted message with both of their secrets (they can do this without sharing them with each other by using a tool like this one; because XOR is commutative it doesn't matter which order the secrets were applied in encryption or decryption) to retrieve the unencrypted PIN.
 
Last edited:
  • Like
Likes   Reactions: sysprog
Hi,
Good idea. Can you please show me the Maths how it works (for multi-party) both for encryption and decryption?

For two party, we have one-time Pad. But how can we use one time pad for muti-party, this is what I want to now.

Zulfi.
 
  • Like
Likes   Reactions: zak100
Hi,
Thanks you are right. We already have One-time Pad. But how can we use One-time pad for multiple party this is my question.

Zulfi.
 
This is not a 'one-time pad', the keys are reusable. I have explained multi-party use in #4.
 
Hi,
Yes you are right one-time pad is used only one time. I am talking about multiparty in the context of stable matching. Two groups and each group has 'n' elements. Each one of the 'n' elements have preference list. I have to encrypt this data so that the other group can't see the see the matching information. The other group can decrypt the information specific to its need. I need an example for this.

Zulfi.
 
  • #10
Have you considered the examples in the paper you linked?
The National Residency Matching Program (NRMP) matches around 32k graduatingmedical students to residency programs in the US every year [23, 33]. The New York City Department of Education (NYCDOE) matches over 90k entering students to public high schools [1]. Also there are many financial applications that require SM, such as vertical networks and their application in supply chains [25].
 

Similar threads

  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 5 ·
Replies
5
Views
2K
  • · Replies 2 ·
Replies
2
Views
490
  • · Replies 0 ·
Replies
0
Views
3K
Replies
10
Views
5K
  • · Replies 3 ·
Replies
3
Views
3K
  • · Replies 13 ·
Replies
13
Views
4K
  • · Replies 1 ·
Replies
1
Views
12K
  • · Replies 7 ·
Replies
7
Views
4K