Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons

被引:9
作者
Carlton, Rhys [1 ]
Essex, Aleksander [1 ]
Kapulkin, Krzysztof [1 ]
机构
[1] Western Univ, London, ON, Canada
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2018 | 2018年 / 10808卷
关键词
Public-key encryption; Homomorphic encryption; Homomorphic threshold; Secure integer comparison; MILLIONAIRES; EFFICIENT; AUCTIONS;
D O I
10.1007/978-3-319-76953-0_8
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a semantically secure somewhat homomorphic public-key cryptosystem working in sub-groups of Z(n)* of prime power order. Our scheme introduces a novel threshold homomorphic property, which we use to build a two-party protocol for secure integer comparison. In contrast to related work which encrypts and acts on each bit of the input separately, our protocol compares multiple input bits simultaneously within a single ciphertext. Compared to the related protocol of Damgard et al. [9,10] we present results showing this approach to be both several times faster in computation and lower in communication complexity.
引用
收藏
页码:137 / 156
页数:20
相关论文
共 27 条
[1]  
[Anonymous], 2015, NDSS
[2]   ENCODING FUNCTIONS WITH CONSTANT ONLINE RATE, OR HOW TO COMPRESS GARBLED CIRCUIT KEYS [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal ;
Waters, Brent .
SIAM JOURNAL ON COMPUTING, 2015, 44 (02) :433-466
[3]  
Benaloh J., 1994, WORKSH SEL AR CRYPT
[4]  
Benhamouda F, 2017, J CRYPTOL, V30, P519, DOI 10.1007/s00145-016-9229-5
[5]  
Blake IF, 2006, LECT NOTES COMPUT SC, V4107, P206
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[7]  
Ching-Hua Yu, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P426, DOI 10.1007/978-3-642-32928-9_24
[8]   The Simplest Protocol for Oblivious Transfer [J].
Chou, Tung ;
Orlandi, Claudio .
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 :40-58
[9]  
Coron JS, 2011, LECT NOTES COMPUT SC, V6571, P147, DOI 10.1007/978-3-642-19379-8_9
[10]  
Damgard Ivan, 2009, International Journal of Applied Cryptography, V1, P323, DOI 10.1504/IJACT.2009.028031