Secure comparison protocols in the semi-honest model

Thijs Veugen, Frank Blom, Sebastiaan J.A. de Hoogh, Zekeriya Erkin

Research output: Contribution to journalArticleAcademicpeer-review

53 Citations (Scopus)

Abstract

Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair comparison of existing protocols in terms of run-time, bandwidth requirement and round complexity has been lacking so far. In this paper, we analyze the stateof- the-art comparison protocols for a two-party setting in the semihonest security protocol. We analyze their performances in three stages, namely initialization, pre-processing and online computation, by implementing them on a single platform. The results of our experiments provide a clear insight for the research community into the advantages and disadvantages of the various techniques.

Original languageEnglish
Article number7101213
Pages (from-to)1217-1228
Number of pages12
JournalIEEE journal of selected topics in signal processing
Volume9
Issue number7
DOIs
Publication statusPublished - 1 Oct 2015
Externally publishedYes

Keywords

  • Communication complexity
  • Computational complexity
  • Cryptographic protocols
  • Garbled circuits
  • Homomorphic encryption
  • Preprocessing
  • Runtime
  • Secret sharing
  • Secure comparison
  • Secure multi-party computation
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Secure comparison protocols in the semi-honest model'. Together they form a unique fingerprint.

Cite this