An Efficient Data-Independent Priority Queue and its Application to Dark Pools

Authors: Sahar Mazloom (J. P. Morgan AI Research), Benjamin Diamond (Coinbase), Antigoni Polychroniadou (J. P. Morgan AI Research), Tucker Balch (J. P. Morgan AI Research)

Volume: 2023
Issue: 2
Pages: 5–22
DOI: https://doi.org/10.56553/popets-2023-0038

Download PDF

Abstract: We introduce a secure data-independent priority queue which supports polylogarithmic-time insertion operations and constant-time deletions and read-front (aka peek) operations as opposed to the originally introduced queue by Toft (PODC '11). Moreover, we minimize the number of comparisons required to perform different operations on Toft's priority queue. Data-independent data structures—first identified explicitly by Toft, and further elaborated by Mitchell and Zimmerman (STACS '14)—serve the purpose of computing on encrypted data without executing branching code which can be used to avoid prohibitively expensive operations in secure computation applications. Focusing on the costly sorting operations, we show significant asymptotic improvements over prior privacy preserving dark pool applications. Dark pools are securities-trading venues which attain ad-hoc order privacy, by matching orders outside of publicly visible exchanges via the so-called dark pool operators. In this paper, we describe an efficient and secure dark pool (implementing a full continuous double auction) based on our new priority queue. Our construction's security guarantees are cryptographic based on secure multiparty computation (MPC), and do not require that the dark pool operators are trusted. Our construction improves upon the asymptotic efficiency attained by previous efforts. Existing cryptographic dark pools process new orders in time which grows linearly in the size of the standing order book; ours does so in polylogarithmic time. We describe a concrete implementation of our MPC protocol with malicious security in the honest majority setting. We also report benchmarks of our implementation and compare them to prior works. Our protocol reduces the total running time by several orders of magnitude over prior secure dark pool solutions.

Keywords: Secure Computation, Privacy-Preserving Dark Pools, Data-Independent Data Structure

Copyright in PoPETs articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.