Secure Comparison Protocols in the Semi-Honest Model

Selected Topics in Signal Processing, IEEE Journal of(2015)

引用 43|浏览45
暂无评分
摘要
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacypreserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair comparison of existing protocols in terms of run-time, bandwidth requirement and round complexity has been lacking so far. In this paper, we analyse the state-of-the-art comparison protocols for a twoparty setting in the semi-honest security protocol. We analyse their performances in three stages, namely initialization, preprocessing and online computation, by implementing them on a single platform. The results of our experiments provide a clear insight for the research community into the advantages and disadvantages of the various techniques.
更多
查看译文
关键词
preprocessing,homomorphic encryption,protocols,cryptography,logic gates,data privacy,ict,communication complexity,encryption,cryptographic protocols,secure multi party computation,informatics,computational modeling,secret sharing,computational complexity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要