2019
DOI: 10.1587/transfun.e102.a.1048
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…The efficiency of a given protocol depends on the constraints of the secure computational environment for which it is designed. We direct the reader to [28] for a comprehensive discussion of comparison protocol design. For the computational environment used in this work, (i.e.…”
Section: Secure Comparison Protocolmentioning
confidence: 99%
“…The efficiency of a given protocol depends on the constraints of the secure computational environment for which it is designed. We direct the reader to [28] for a comprehensive discussion of comparison protocol design. For the computational environment used in this work, (i.e.…”
Section: Secure Comparison Protocolmentioning
confidence: 99%
“…The efficiency of a given protocol depends on the constraints of the secure computational environment for which it is designed. We direct the reader to [25] for a comprehensive discussion of comparison protocol design. For the computational environment used in this work, (i.e.…”
Section: Secure Comparison Protocolmentioning
confidence: 99%