Abstract
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair comparison of existing protocols in terms of run-time, bandwidth requirement and round complexity has been lacking so far. In this paper, we analyze the stateof- the-art comparison protocols for a two-party setting in the semihonest security protocol. We analyze their performances in three stages, namely initialization, pre-processing and online computation, by implementing them on a single platform. The results of our experiments provide a clear insight for the research community into the advantages and disadvantages of the various techniques.
Original language | English |
---|---|
Article number | 7101213 |
Pages (from-to) | 1217-1228 |
Number of pages | 12 |
Journal | IEEE journal of selected topics in signal processing |
Volume | 9 |
Issue number | 7 |
DOIs | |
Publication status | Published - 1 Oct 2015 |
Externally published | Yes |
Keywords
- Communication complexity
- Computational complexity
- Cryptographic protocols
- Garbled circuits
- Homomorphic encryption
- Preprocessing
- Runtime
- Secret sharing
- Secure comparison
- Secure multi-party computation
- n/a OA procedure