Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-73458-1_30
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Comparison for On-Line Auctions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
165
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 150 publications
(183 citation statements)
references
References 12 publications
1
165
0
Order By: Relevance
“…In the following we show that our GC-based comparison protocol outperforms the comparison protocol of Damgård, Geisler and Kroigård presented in [DGK07] for the online auction scenario.…”
Section: First-price Auctionsmentioning
confidence: 70%
See 3 more Smart Citations
“…In the following we show that our GC-based comparison protocol outperforms the comparison protocol of Damgård, Geisler and Kroigård presented in [DGK07] for the online auction scenario.…”
Section: First-price Auctionsmentioning
confidence: 70%
“…It can be instantiated with a variety of cryptosystems including [Pai99,DJ01], or the cryptosystem of [DGK07,DGK08b,DGK08a] which is restricted to small plaintext space P -just to name a few.…”
Section: Homomorphic Encryption (He)mentioning
confidence: 99%
See 2 more Smart Citations
“…An important application arises in the context of secure integer comparisons, as noted first in [20]. A common step in many integer comparison protocols [2,1,10,8,20], requires parties to find out whether a special value occurs in a given list of encryptions. For example, whether there is a 0 among otherwise random values.…”
Section: Introductionmentioning
confidence: 99%