TY - GEN
T1 - Enhanced Secure Comparison Schemes Using Homomorphic Encryption
AU - Wang, Lihua
AU - Saha, Tushar Kanti
AU - Aono, Yoshinori
AU - Koshiba, Takeshi
AU - Moriai, Shiho
N1 - Funding Information:
Acknowledgements. We thank Takuya Hayashi for the useful discussion and contribution to the implementation shown in Sect. 3.2. This work is partially supported by JST CREST (JPMJCR19F6) and JSPS KAKENHI Grant Number (JP20K11826).
Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
PY - 2021
Y1 - 2021
N2 - Comparing two integers under the encrypted form is useful for privacy-preserving data mining, secure auction, and so on. Based on the ring-learning with errors (ring-LWE) assumption, Saha and Koshiba proposed a practical approach—SK17—in [NBiS2017], established under the 3-party computation model where two clients (one of them has a decryption key) compare their data via an outsource cloud server without revealing their data. In this study, we propose three enhanced schemes from SK17 to improve efficiency, security, and flexibility. We implement the first protocol to show its efficiency using the ring-LWE-based homomorphic encryption scheme proposed by Lauter et al., while providing security analysis and practicality evaluation in the theory for the other two protocols.
AB - Comparing two integers under the encrypted form is useful for privacy-preserving data mining, secure auction, and so on. Based on the ring-learning with errors (ring-LWE) assumption, Saha and Koshiba proposed a practical approach—SK17—in [NBiS2017], established under the 3-party computation model where two clients (one of them has a decryption key) compare their data via an outsource cloud server without revealing their data. In this study, we propose three enhanced schemes from SK17 to improve efficiency, security, and flexibility. We implement the first protocol to show its efficiency using the ring-LWE-based homomorphic encryption scheme proposed by Lauter et al., while providing security analysis and practicality evaluation in the theory for the other two protocols.
UR - http://www.scopus.com/inward/record.url?scp=85090027693&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85090027693&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-57811-4_20
DO - 10.1007/978-3-030-57811-4_20
M3 - Conference contribution
AN - SCOPUS:85090027693
SN - 9783030578107
T3 - Advances in Intelligent Systems and Computing
SP - 211
EP - 224
BT - Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020
A2 - Barolli, Leonard
A2 - Li, Kin Fun
A2 - Enokido, Tomoya
A2 - Takizawa, Makoto
PB - Springer
T2 - 23rd International Conference on Network-Based Information Systems, NBiS 2020
Y2 - 31 August 2020 through 2 September 2020
ER -