2018
DOI: 10.1007/978-3-319-98989-1_20
|View full text |Cite
|
Sign up to set email alerts
|

Constant-Round Client-Aided Secure Comparison Protocol

Abstract: We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation.Our protocol is in the so-called client-server model, which is utilized in real-world MPC products such as Sharemind, where any number of clients can create shares of their input and distribute to the servers who then jointly compute over the shares and return the shares of result to the client. In the client-aided client-server model, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…By Table 1, our 2PC protocol (in Truncation mode) has round complexity even smaller than the best known (accurate) 3PC protocol [7]. We note that our protocols (as well as the protocols in [20]) require somewhat complicated correlated randomness and therefore the use of the so-called trusted initializer model, such as the client-aided model (e.g., [18], [19]), in the offline phase suits well.…”
Section: Our Contributionsmentioning
confidence: 85%
“…By Table 1, our 2PC protocol (in Truncation mode) has round complexity even smaller than the best known (accurate) 3PC protocol [7]. We note that our protocols (as well as the protocols in [20]) require somewhat complicated correlated randomness and therefore the use of the so-called trusted initializer model, such as the client-aided model (e.g., [18], [19]), in the offline phase suits well.…”
Section: Our Contributionsmentioning
confidence: 85%
“…To the best of our knowledge, our Overflow (and its extensions) are the first constant-round secure protocols that work not over F but over Z 2 . Moreover, in comparison with the state of the art constant-round Comparison protocol in two-party setting [17], our Comparison protocol is better in terms of communication rounds and data transfer. In fact, [17] needs five rounds and ((log ) 3 ) bit data transfer for SS over F , while our protocol needs four rounds and…”
Section: Comparison With Related Workmentioning
confidence: 96%
“…In this paper, we adopt the client-aided model [15], [17], [20] for client-server SS-based MPC, which is a kind of trusted dealer setup model. More precisely, in this model, the clients still do not participate in the online computation phase of the protocol, while in the pre-computation phase, the clients send to the servers not only their shared inputs but also certain kinds of auxiliary information (i.e., Beaver triples) we use in the protocol.…”
Section: A Note On Client-aided Modelmentioning
confidence: 99%
“…We need to O(log n) communication rounds since we calculate the overflow from the lower bits. If we adopt not the shares over Z 2 n but Z p (p: prime), we can construct constant-round Comparison via the different strategy [43], [44].…”
Section: Higher-level Secure Protocolsmentioning
confidence: 99%