Three-Party Integer Comparison and Applications

05/03/2021
by   Jie Ma, et al.
0

Secure integer comparison has been a popular research topic in cryptography, both for its simplicity to describe and for its applications. The aim is to enable two parties to compare their inputs without revealing the exact value of those inputs. In this paper, we highlight three-party integer comparison (TPIC), where a judge, with no private input, wants to know the comparison result, while two competitors hold secret integers to do privacy-preserving comparison. The judge actively obtains the result rather than passively waiting for it sent by a competitor. We give two TPIC constructions considering Mixed adversaries, who have with different capabilities. One is secure against a semi-honest adversary with low computation and communication cost, while the other is secure against a malicious adversary. Basing on TPIC, we present multi-party comparisons through concrete applications, including a joint bidding scheme and a practical auction. Brief security proofs and analysis for the applications are presented. In comparison, our auction scheme is more efficient with lower cost, making it feasible in practice rather than a theoretical design. All the comparisons and application schemes run on top of blockchain requiring a constant number of rounds.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/18/2018

Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter

Truthful spectrum auction is believed to be an effective method for spec...
research
06/15/2019

A Practical Solution to Yao's Millionaires' Problem and Its Application in Designing Secure Combinatorial Auction

The emergence of e-commerce and e-voting platforms has resulted in the r...
research
07/29/2020

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

Due to the great development of secure multi-party computation, many pra...
research
09/20/2020

Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis

A digital goods auction is a type of auction where potential buyers bid ...
research
05/12/2019

Secure Error Correction using Multi-Party Computation

During recent years with the increase of data and data analysis needs, p...
research
03/08/2021

Multiparty Protocol that Usually Shuffles

Multiparty computation is raising importance because it's primary object...
research
09/15/2021

MPC-Friendly Commitments for Publicly Verifiable Covert Security

We address the problem of efficiently verifying a commitment in a two-pa...

Please sign up or login with your details

Forgot password? Click here to reset