Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter June 10, 2009

One-round secure comparison of integers

  • Ian F. Blake and Vladimir Kolesnikov

Abstract

We consider the problem of securely evaluating the Greater Than (GT) predicate and its extension – transferring one of two secrets, depending on the result of comparison. We generalize our solutions and show how to securely decide membership in the union of a set of intervals. We then consider the related problem of comparing two encrypted numbers. We show how to efficiently apply our solutions to practical settings, such as auctions with the semi-honest auctioneer, proxy selling, etc. All of our protocols are one round.

We propose new primitives, Strong Conditional Oblivious Transfer (SCOT) and Conditional Encrypted Mapping (CEM), which capture common security properties of one round protocols in a variety of settings, which may be of independent interest.

Received: 2007-11-05
Revised: 2009-01-05
Published Online: 2009-06-10
Published in Print: 2009-May

© de Gruyter 2009

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 15.5.2024 from https://www.degruyter.com/document/doi/10.1515/JMC.2009.003/html
Scroll to top button