order to keep the privacy of the computation, we use
the permutation procedure to mask the real identities
of the vertices. The private reading protocol is used to
return the real value of the vertices after finished the
private calculation.
The future work on parallel privacy-preserving
minimum spanning tree algorithms may focus on
more parallelization opportunities for minimum span-
ning tree algorithms especially for sparse representa-
tion, not just for sparse data as in this paper. Also,
it may include the study of more MST algorithms
that may have an algorithmic structure that can be
parallelized efficiently to reduce the round complex-
ity more. The ability to use multiple-instruction-
multiple-data to reduce the round complexity of the
MST algorithm may also be useful.
ACKNOWLEDGEMENT
We would like to express our very great appreciation
to Dr.Benson Muite from the institutes of Computer
Science at the University of Tartu, for his valuable
and constructive suggestions during this work. This
work was supported by European Regional Develop-
ment fund through EXCITE-the Estonian Centre of
Excellence in ICT Research.
REFERENCES
Agrawal, R. and Srikant, R. (2000). Privacy-preserving data
mining. In Proceedings of the 2000 ACM SIGMOD in-
ternational conference on Management of data, pages
439–450.
Aly, A. and Cleemput, S. (2017). An improved proto-
col for securely solving the shortest path problem and
its application to combinatorial auctions. Cryptology
ePrint Archive, Report 2017/971. https://eprint.iacr.
org/2017/971.
Awerbuch, B. and Shiloach, Y. (1987). New connectivity
and msf algorithms for shuffle-exchange network and
pram. IEEE Transactions on Computers, (10):1258–
1263.
Bogdanov, D., Jagom
¨
agis, R., and Laur, S. (2012a). A
universal toolkit for cryptographically secure privacy-
preserving data mining. In Pacific-Asia Workshop on
Intelligence and Security Informatics, pages 112–126.
Springer.
Bogdanov, D., Kamm, L., Laur, S., Pruulmann-Vengerfeldt,
P., Talviste, R., and Willemson, J. (2014a). Privacy-
preserving statistical data analysis on federated
databases. In Annual Privacy Forum, pages 30–55.
Springer.
Bogdanov, D., Laud, P., and Randmets, J. (2014b). Domain-
polymorphic programming of privacy-preserving ap-
plications. In Proceedings of the Ninth Workshop on
Programming Languages and Analysis for Security,
pages 53–65.
Bogdanov, D., Laur, S., and Willemson, J. (2008). Share-
mind: A framework for fast privacy-preserving com-
putations. In European Symposium on Research in
Computer Security, pages 192–206. Springer.
Bogdanov, D., Niitsoo, M., Toft, T., and Willemson, J.
(2012b). High-performance secure multi-party com-
putation for data mining applications. International
Journal of Information Security, 11(6):403–418.
Boldon, B., Deo, N., and Kumar, N. (1996). Minimum-
weight degree-constrained spanning tree problem:
Heuristics and implementation on an simd parallel
machine. Parallel Computing, 22(3):369–382.
Boruvka, O. (1926). On a minimal problem. Pr
´
ace
Moravsk
´
e Pridovedeck
´
e Spolecnosti, 3:37–58.
Burkhart, M., Strasser, M., Many, D., and Dimitropoulos,
X. (2010). Sepia: Privacy-preserving aggregation of
multi-domain network events and statistics. Network,
1(101101).
Canetti, R. (2000). Security and composition of multiparty
cryptographic protocols. Journal of CRYPTOLOGY,
13(1):143–202.
Chung, S. and Condon, A. (1996). Parallel implementa-
tion of bouvka’s minimum spanning tree algorithm.
In Proceedings of International Conference on Paral-
lel Processing, pages 302–308. IEEE.
Damg
˚
ard, I., Geisler, M., Krøigaard, M., and Nielsen, J. B.
(2009). Asynchronous multiparty computation: The-
ory and implementation. In International workshop
on public key cryptography, pages 160–179. Springer.
Damg
˚
ard, I. and Nielsen, J. B. (2003). Universally com-
posable efficient multiparty computation from thresh-
old homomorphic encryption. In Annual International
Cryptology Conference, pages 247–264. Springer.
Demmler, D., Schneider, T., and Zohner, M. (2015). Aby-
a framework for efficient mixed-protocol secure two-
party computation. In NDSS.
Freedman, M. J., Nissim, K., and Pinkas, B. (2004). Effi-
cient private matching and set intersection. In Inter-
national conference on the theory and applications of
cryptographic techniques, pages 1–19. Springer.
Henecka, W., K
¨
ogl, S., Sadeghi, A.-R., Schneider, T., and
Wehrenberg, I. (2010). Tasty: tool for automating se-
cure two-party computations. In Proceedings of the
17th ACM conference on Computer and communica-
tions security, pages 451–462.
Johnson, D. B. and Metaxas, P. (1992). A parallel algorithm
for computing minimum spanning trees. In Proceed-
ings of the fourth annual ACM symposium on Parallel
algorithms and architectures, pages 363–372.
Klein, P. and Stein, C. (1990). A parallel algorithm for elim-
inating cycles in undirected graphs. Information Pro-
cessing Letters, 34(6):307–312.
Kruskal, J. B. (1956). On the shortest spanning subtree of
a graph and the traveling salesman problem. Proceed-
ings of the American Mathematical society, 7(1):48–
50.
Laud, P. (2015). Parallel oblivious array access for secure
multiparty computation and privacy-preserving mini-
Parallel Privacy-preserving Computation of Minimum Spanning Trees
189