2017 15th Annual Conference on Privacy, Security and Trust (PST) 2017
DOI: 10.1109/pst.2017.00033
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Secure comparison protocols have many variants (cf. [2]); in order to be able to flexibly use them as building blocks in larger applications, it is imperative to consider the variant with shared inputs and shared output. More precisely, the inputs to the protocol are shares of x and shares of y, while the output comprises shares of bit b which indicates the result of comparing x < y (note that it is sufficient w.l.o.g.…”
Section: Secure Comparison Protocolsmentioning
confidence: 99%
See 4 more Smart Citations
“…Secure comparison protocols have many variants (cf. [2]); in order to be able to flexibly use them as building blocks in larger applications, it is imperative to consider the variant with shared inputs and shared output. More precisely, the inputs to the protocol are shares of x and shares of y, while the output comprises shares of bit b which indicates the result of comparing x < y (note that it is sufficient w.l.o.g.…”
Section: Secure Comparison Protocolsmentioning
confidence: 99%
“…This enables us to construct the LSB protocol based on a comparison protocol with plain inputs and shared output, called PlainLessThan protocol. -We then construct a protocol for PlainLessThan by using a tree-based structure called dyadic range, similarly to [2]. This has two advantages.…”
Section: Our Contributionmentioning
confidence: 99%
See 3 more Smart Citations