Abstract

Private integer comparison has been an essential computation function for many applications, including online auction, credential identification, data mining, and joint bidding. In the setting of two-party computation, two parties with private inputs ( $x$ and $y$ ) want to jointly compare them without revealing the value of those inputs to others (also known as the Millionaires’ problem) while the output should ensure correctness and preserve data privacy. The private inputs only can be revealed if they are equal, i.e., $x=y$ . Many related works have been proposed to solve the integer comparison problem in various settings, focusing on different properties such as round and computation complexity. Most solutions decompose integers into bitwise representation and then securely evaluate the function in a Boolean circuit on encrypted bits. However, this type of solution is costly (especially for large integers) as each bit requires encryption and decryption. In this paper, we transform the private integer comparison into a block comparison problem. In particular, we employ a block vectorization mechanism to encode the private inputs into blocks. We show the security of our two-party protocol in the semi-honest model. Also, we implement the protocol to demonstrate its efficiency using block vectorization mechanism and homomorphic encryption. The experimental result proves that our proposed solution achieves high efficiency, particularly for large integer comparisons.

Highlights

  • S ECURE two-party computation has been an important area of research in cryptography

  • Private integer comparison is fundamental to GT problem such that given two private integer inputs x and y, the protocol outputs true if x > y, false otherwise

  • In the two-party setting, secure integer comparison allows two mistrusting parties to jointly compare their private inputs without the presence of a trusted third party (TTP)

Read more

Summary

Introduction

S ECURE two-party computation has been an important area of research in cryptography. The idea is to allow two parties to securely evaluate a function on their private inputs without leaking extra information to any party. Each party can send their private inputs to a trusted third party (TTP) that functions as the central repository or data warehouse to perform the comparison. This is an ideal approach to support secure computations if the data being used are not sensitive information (e.g., sharing of project member’s names, email addresses, and contact numbers). In the two-party setting, secure integer comparison allows two mistrusting parties to jointly compare their private inputs without the presence of a trusted third party (TTP)

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.