Cargando…
Secure multiparty computation of a comparison problem
Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text] , or [Formula: see text] in one execution. First, a 0–1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser–M...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5011474/ https://www.ncbi.nlm.nih.gov/pubmed/27652062 http://dx.doi.org/10.1186/s40064-016-3061-0 |
_version_ | 1782451829932556288 |
---|---|
author | Liu, Xin Li, Shundong Liu, Jian Chen, Xiubo Xu, Gang |
author_facet | Liu, Xin Li, Shundong Liu, Jian Chen, Xiubo Xu, Gang |
author_sort | Liu, Xin |
collection | PubMed |
description | Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text] , or [Formula: see text] in one execution. First, a 0–1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser–Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions. |
format | Online Article Text |
id | pubmed-5011474 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-50114742016-09-20 Secure multiparty computation of a comparison problem Liu, Xin Li, Shundong Liu, Jian Chen, Xiubo Xu, Gang Springerplus Research Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text] , or [Formula: see text] in one execution. First, a 0–1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser–Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions. Springer International Publishing 2016-09-05 /pmc/articles/PMC5011474/ /pubmed/27652062 http://dx.doi.org/10.1186/s40064-016-3061-0 Text en © The Author(s) 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Research Liu, Xin Li, Shundong Liu, Jian Chen, Xiubo Xu, Gang Secure multiparty computation of a comparison problem |
title | Secure multiparty computation of a comparison problem |
title_full | Secure multiparty computation of a comparison problem |
title_fullStr | Secure multiparty computation of a comparison problem |
title_full_unstemmed | Secure multiparty computation of a comparison problem |
title_short | Secure multiparty computation of a comparison problem |
title_sort | secure multiparty computation of a comparison problem |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5011474/ https://www.ncbi.nlm.nih.gov/pubmed/27652062 http://dx.doi.org/10.1186/s40064-016-3061-0 |
work_keys_str_mv | AT liuxin securemultipartycomputationofacomparisonproblem AT lishundong securemultipartycomputationofacomparisonproblem AT liujian securemultipartycomputationofacomparisonproblem AT chenxiubo securemultipartycomputationofacomparisonproblem AT xugang securemultipartycomputationofacomparisonproblem |