Correction of a secure comparison protocol for encrypted integers in IEEE WIFS 2012

Baptiste Vinh Mau, Koji Nuida

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In secure multi-party computation, one of the most useful and basic functionalities that have been realized over additive homomorphic encryption is secure comparison of two integers, where one party has encrypted integers to be compared while only the other party has the decryption key. In IEEE WIFS 2012, Veugen proposed an efficient protocol for this problem in the semi-honest model, which provides perfect security against the latter party. In this paper, we point out that the protocol by Veugen outputs an incorrect value in some cases, and then propose a way to fix the flaws with only slight overhead in efficiency. Our proposed correction is not straightforward, in the sense that it required an “outsourced” homomorphic multiplication protocol for two encrypted values, which was not needed in the original protocol.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings
EditorsSatoshi Obana, Koji Chida
PublisherSpringer Verlag
Pages181-191
Number of pages11
ISBN (Print)9783319641997
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event12th International Workshop on Security, IWSEC 2017 - Hiroshima, Japan
Duration: Aug 30 2017Sep 1 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10418 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other12th International Workshop on Security, IWSEC 2017
CountryJapan
CityHiroshima
Period8/30/179/1/17

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Correction of a secure comparison protocol for encrypted integers in IEEE WIFS 2012'. Together they form a unique fingerprint.

Cite this