scispace - formally typeset
Open AccessBook ChapterDOI

Practical and secure solutions for integer comparison

Reads0
Chats0
TLDR
In this paper, the authors consider a variant of the millionaires' problem in which the inputs x, y as well as the output bit x > y are encrypted and propose new logarithmicround and constant-round protocols for integer comparison.
Abstract
Yao's classical millionaires' problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, respectively. The output x > y becomes known to both parties. In this paper, we consider a variant of Yao's problem in which the inputs x, y as well as the output bit x > y are encrypted. Referring to the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer, Damgard, and Nielsen at Eurocrypt 2001, we develop solutions for integer comparison, which take as input two lists of encrypted bits representing x and y, respectively, and produce an encrypted bit indicating whether x > y as output. Secure integer comparison is an important building block for applications such as secure auctions. In this paper, our focus is on the two-party case, although most of our results extend to the multi-party case. We propose new logarithmicround and constant-round protocols for this setting, which achieve simultaneously very low communication and computational complexities. We analyze the protocols in detail and show that our solutions compare favorably to other known solutions.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Privacy-Preserving Face Recognition

TL;DR: This paper proposes for the first time a strongly privacy-enhanced face recognition system, which allows to efficiently hide both the biometrics and the result from the server that performs the matching operation, by using techniques from secure multiparty computation.
Book ChapterDOI

Efficient privacy-preserving face recognition

TL;DR: A privacy-preserving face recognition scheme that substantially improves over previous work in terms of communication-and computation efficiency and has a substantially smaller online communication complexity.
Journal ArticleDOI

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

TL;DR: This tutorial article introduces the fusion of signal processing and cryptography as an emerging paradigm to protect the privacy of users.
Book ChapterDOI

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

TL;DR: This work considers generic Garbled Circuit-based techniques for Secure Function Evaluation (SFE) in the semi-honest model and describes efficient GC constructions for addition, subtraction, multiplication, and comparison functions.
Journal ArticleDOI

Homomorphic encryption and secure comparison

TL;DR: It is shown how the proposed protocol for secure comparison of integers based on homomorphic encryption can be used to improve security of online auctions, and that it is efficient enough to be used in practice.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Book ChapterDOI

Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols

TL;DR: In this paper, the authors show how to transform a proof of knowledge P into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of n problem instances out of a collection of subsets denned by a secret sharing scheme S on n participants.
BookDOI

Advances in Cryptology - CRYPTO 2003

Dan Boneh
TL;DR: This paper describes a new hardware implementation of the NFS sieving step (based on standard 0.13μm, 1GHz silicon VLSI technology) which is 3-4 orders of magnitude more cost effective than the best previously published designs (such as the optoelectronic TWINKLE and the mesh-based sieving).