An Efficient Privacy-Preserving Comparison Protocol

被引:5
作者
Saha, Tushar Kanti [1 ]
Koshiba, Takeshi [2 ]
机构
[1] Saitama Univ, Grad Sch Sci & Engn, Div Math Elect & Informat, Saitama, Japan
[2] Waseda Univ, Fac Educ & Integrated Arts & Sci, Tokyo, Japan
来源
ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017 | 2018年 / 7卷
关键词
FULLY HOMOMORPHIC ENCRYPTION; SECURITY;
D O I
10.1007/978-3-319-65521-5_48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address an efficient privacy-preserving comparison protocol using somewhat homomorphic encryption based on ring learning with errors (ring-LWE) problem in the semi-honest model. Here we take two l-bit integers a and b as input and produce the output indicating a < b or a >= b. To accomplish this task, Damgard, Geisler, and Kroigard (DGK) [Int. J. of Appl. Cryptol., 1(1), 2008] proposed an efficient protocol using an additively homomorphic encryption scheme in the semi-honest model. Thereafter many attempts were made to improve the performance for the privacy-preserving integer comparison but the improvement is not remarkable. Until now, the DGK protocol is believed to be one of the efficient comparison protocols using homomorphic encryption. The DGK protocol executes an integer comparison within 969 ms (resp., 1977 ms) for 16-bit (resp., 32-bit) integers under the 112-bit security level (by using the 2048-bit RSA). In this paper, we propose a more efficient comparison protocol than the DGK protocol. For the efficiency, we propose two new packing methods to make the comparison computation faster for some packed ciphertexts. The first packing method helps the multiple Hamming distance computation and the second packing method helps to compute the bit differences of two l-bit integers. Finally, our experiments at the 140-bit security level show that our method is about 147 times faster for 16-bit integers comparison and 146 times faster for 32-bit integers comparison than that of the DGK protocol.
引用
收藏
页码:553 / 565
页数:13
相关论文
共 26 条
[1]  
[Anonymous], 2016, Tech. Rep
[2]  
[Anonymous], 2009, Post quantum cryptography
[3]  
[Anonymous], PARI GP VERS 2 7 5
[4]  
[Anonymous], 1978, FDN SECURE COMPUTATI
[5]  
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[6]  
Blake IF, 2004, LECT NOTES COMPUT SC, V3329, P515
[7]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[8]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[9]  
Chen YM, 2011, LECT NOTES COMPUT SC, V7073, P1, DOI 10.1007/978-3-642-25385-0_1
[10]  
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048