2020
DOI: 10.1587/transfun.2019cip0023
|View full text |Cite
|
Sign up to set email alerts
|

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…We need to O(log n) communication rounds since we calculate the overflow from the lower bits. If we adopt not the shares over Z 2 n but Z p (p: prime), we can construct constant-round Comparison via the different strategy [43], [44].…”
Section: Higher-level Secure Protocolsmentioning
confidence: 99%
“…We need to O(log n) communication rounds since we calculate the overflow from the lower bits. If we adopt not the shares over Z 2 n but Z p (p: prime), we can construct constant-round Comparison via the different strategy [43], [44].…”
Section: Higher-level Secure Protocolsmentioning
confidence: 99%