Secure Equality Testing Protocols in the Two-Party Setting

Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Inald Lagendijk

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In this work, we consider a scenario with two parties where party A has two integers encrypted using an additively homomorphic scheme and party B has the decryption key. Party A would like to obtain an encrypted bit that shows whether the integers are equal or not but nothing more. We propose three secure equality testing protocols, which are more efficient in terms of communication, computation or both compared to the existing work. To support our claims, we present experimental results, which show that our protocols achieve up to 99% computation-wise improvement compared to the state-of-the-art protocols in a fair experimental set-up
Original languageEnglish
Title of host publicationARES 2018
Subtitle of host publicationProceedings of the 13th International Conference on Availability, Reliability and Security
Place of PublicationNew York, NY
PublisherAssociation for Computing Machinery (ACM)
Pages1-10
Number of pages10
ISBN (Print)978-1-4503-6448-5
DOIs
Publication statusPublished - 2018
EventARES 2018: 13th International Conference on Availability, Reliability and Security - Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018
Conference number: 13
https://www.ares-conference.eu/conference/

Conference

ConferenceARES 2018
CountryGermany
CityHamburg
Period27/08/1830/08/18
Internet address

Keywords

  • Processing encrypted data
  • equality test
  • homomorphic encryption
  • privacy
  • efficiency

Fingerprint

Dive into the research topics of 'Secure Equality Testing Protocols in the Two-Party Setting'. Together they form a unique fingerprint.

Cite this