Secure equality testing protocols in the two-party setting

Majid Nateghizad, Thijs Veugen*, Zekeriya Erkin, Reginald L. Lagendijk

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In this work, we consider a scenario with two parties where party A has two integers encrypted using an additively homomorphic scheme and party B has the decryption key. Party A would like to obtain an encrypted bit that shows whether the integers are equal or not but nothing more. We propose three secure equality testing protocols, which are more efficient in terms of communication, computation or both compared to the existing work. To support our claims, we present experimental results, which show that our protocols achieve up to 99% computation-wise improvement compared to the state-of-the-art protocols in a fair experimental set-up.

Original languageEnglish
Title of host publicationARES 2018 - 13th International Conference on Availability, Reliability and Security
Place of PublicationNew York, NY
PublisherAssociation for Computing Machinery
ISBN (Electronic)978-1-4503-6448-5
DOIs
Publication statusPublished - 27 Aug 2018
Externally publishedYes
Event13th International Conference on Availability, Reliability and Security, ARES 2018 - Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018
Conference number: 13

Conference

Conference13th International Conference on Availability, Reliability and Security, ARES 2018
Abbreviated titleARES 2018
Country/TerritoryGermany
CityHamburg
Period27/08/1830/08/18

Keywords

  • Efficiency
  • Equality test
  • Homomorphic encryption
  • Privacy
  • Processing encrypted data
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Secure equality testing protocols in the two-party setting'. Together they form a unique fingerprint.

Cite this