Secure shuffling is a crucial component for private data aggregation and has gained renewed interest in the field of differential privacy.
A survey has identified, categorized, and compared 26 secure protocols that enable the necessary shuffling functionality.
Existing works often overlook practical vulnerabilities and performance trade-offs of secure shufflers, leaving a key question on what constitutes a good secure shuffler.
The survey aims to provide practical guidelines for selecting appropriate protocols and outlines future directions for research in privacy-preserving technologies relying on secure shufflers.