Abstract
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair comparison of existing protocols in terms of run-time, bandwidth requirement and round complexity has been lacking so far. In this paper, we analyze the stateof- the-art comparison protocols for a two-party setting in the semihonest security protocol. We analyze their performances in three stages, namely initialization, pre-processing and online computation, by implementing them on a single platform. The results of our experiments provide a clear insight for the research community into the advantages and disadvantages of the various techniques.
| Original language | English |
|---|---|
| Article number | 7101213 |
| Pages (from-to) | 1217-1228 |
| Number of pages | 12 |
| Journal | IEEE journal of selected topics in signal processing |
| Volume | 9 |
| Issue number | 7 |
| DOIs | |
| Publication status | Published - 1 Oct 2015 |
| Externally published | Yes |
Keywords
- Communication complexity
- Computational complexity
- Cryptographic protocols
- Garbled circuits
- Homomorphic encryption
- Preprocessing
- Runtime
- Secret sharing
- Secure comparison
- Secure multi-party computation
- n/a OA procedure
Fingerprint
Dive into the research topics of 'Secure comparison protocols in the semi-honest model'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver