Proceedings of the 17th International Joint Conference on E-Business and Telecommunications 2020
DOI: 10.5220/0009822403400348
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Greater-Than Integer Comparison without Binary Decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The communications and computations are inefficient requiring many rounds of interaction. In contrast to bitwise comparisons, more efficient protocols were given in [7,8,9,10] to compare multiple bits simultaneously with a single ciphertext by a somewhat homomorphic encryption.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The communications and computations are inefficient requiring many rounds of interaction. In contrast to bitwise comparisons, more efficient protocols were given in [7,8,9,10] to compare multiple bits simultaneously with a single ciphertext by a somewhat homomorphic encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Two constant-round constructions are given against semi-honest and malicious adversary respectively. One is built on [7] for semi-honest competitors, and has low communication and computation cost (it can be improved by the method in [9,10] to reduce one round), while the other is built on the technique of Fischlin [5] for malicious competitors. In both, the judge is assumed to be semi-honest and non-colluding with competitors to maintain the comparison result.…”
Section: Introductionmentioning
confidence: 99%