Title :
Secure Comparison Protocols in the Semi-Honest Model
Author :
Veugen, Thijs ; Blom, Frank ; de Hoogh, Sebastiaan J. A. ; Erkin, Zekeriya
Author_Institution :
Technical Sciences, TNO, The Hague, The Netherlands
Abstract :
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair comparison of existing protocols in terms of run-time, bandwidth requirement and round complexity has been lacking so far. In this paper, we analyze the state-of-the-art comparison protocols for a two-party setting in the semi-honest security protocol. We analyze their performances in three stages, namely initialization, pre-processing and online computation, by implementing them on a single platform. The results of our experiments provide a clear insight for the research community into the advantages and disadvantages of the various techniques .
Keywords :
Complexity theory; Computational modeling; Encryption; Logic gates; Protocols; Secure comparison; communication complexity; computational complexity; cryptographic protocols; garbled circuits; homomorphic encryption; preprocessing; runtime; secret sharing; secure multi-party computation;
Journal_Title :
Selected Topics in Signal Processing, IEEE Journal of
DOI :
10.1109/JSTSP.2015.2429117