Visible to the public Secure Equality Testing Protocols in the Two-Party Setting

TitleSecure Equality Testing Protocols in the Two-Party Setting
Publication TypeConference Paper
Year of Publication2018
AuthorsNateghizad, Majid, Veugen, Thijs, Erkin, Zekeriya, Lagendijk, Reginald L.
Conference NameProceedings of the 13th International Conference on Availability, Reliability and Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6448-5
Keywordscomposability, Cyber physical system, cyber physical systems, efficiency, efficient encryption, equality test, homomorphic encryption, privacy, Processing encrypted data, pubcrawl, resilience, Resiliency
Abstract

Protocols for securely testing the equality of two encrypted integers are common building blocks for a number of proposals in the literature that aim for privacy preservation. Being used repeatedly in many cryptographic protocols, designing efficient equality testing protocols is important in terms of computation and communication overhead. In this work, we consider a scenario with two parties where party A has two integers encrypted using an additively homomorphic scheme and party B has the decryption key. Party A would like to obtain an encrypted bit that shows whether the integers are equal or not but nothing more. We propose three secure equality testing protocols, which are more efficient in terms of communication, computation or both compared to the existing work. To support our claims, we present experimental results, which show that our protocols achieve up to 99% computation-wise improvement compared to the state-of-the-art protocols in a fair experimental set-up.

URLhttps://dl.acm.org/doi/10.1145/3230833.3230866
DOI10.1145/3230833.3230866
Citation Keynateghizad_secure_2018