Paper 2020/1169

Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model

Sigurd Eskeland

Abstract

Common for the overwhelming majority of privacy-preserving greater-than integer comparison schemes is that cryptographic computations are conducted in a bitwise manner. To ensure secrecy, each bit must be encoded in such a way that nothing is revealed to the opposite party. The most noted disadvantage is that the computational and communication cost of bitwise encoding is at best linear to the number of bits. Also, many proposed schemes have complex designs that may be difficult to implement. Carlton et al. proposed in 2018 an interesting scheme that avoids bitwise decomposition and works on whole integers. A variant was proposed by Bourse et al. in 2019. Despite that the stated adversarial model of these schemes is honest-but-curious users, we show that they are vulnerable to malicious users. Inspired by the two mentioned papers, we propose a novel comparison scheme, which is resistant to malicious users.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT
DOI
10.5220/0009822403400348
Keywords
Millionaires' problemSecure two-party computationPrivacy protocols
Contact author(s)
sigurd eskeland @ nr no
History
2020-09-25: received
Short URL
https://ia.cr/2020/1169
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1169,
      author = {Sigurd Eskeland},
      title = {Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1169},
      year = {2020},
      doi = {10.5220/0009822403400348},
      url = {https://eprint.iacr.org/2020/1169}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.