Three-Party Integer Comparison and Applications

by   Jie Ma, et al.

Secure integer comparison has been a popular research topic in cryptography, both for its simplicity to describe and for its applications. The aim is to enable two parties to compare their inputs without revealing the exact value of those inputs. In this paper, we highlight three-party integer comparison (TPIC), where a judge, with no private input, wants to know the comparison result, while two competitors hold secret integers to do privacy-preserving comparison. The judge actively obtains the result rather than passively waiting for it sent by a competitor. We give two TPIC constructions considering Mixed adversaries, who have with different capabilities. One is secure against a semi-honest adversary with low computation and communication cost, while the other is secure against a malicious adversary. Basing on TPIC, we present multi-party comparisons through concrete applications, including a joint bidding scheme and a practical auction. Brief security proofs and analysis for the applications are presented. In comparison, our auction scheme is more efficient with lower cost, making it feasible in practice rather than a theoretical design. All the comparisons and application schemes run on top of blockchain requiring a constant number of rounds.


page 1

page 2

page 3

page 4


Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter

Truthful spectrum auction is believed to be an effective method for spec...

A Practical Solution to Yao's Millionaires' Problem and Its Application in Designing Secure Combinatorial Auction

The emergence of e-commerce and e-voting platforms has resulted in the r...

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

Due to the great development of secure multi-party computation, many pra...

Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis

A digital goods auction is a type of auction where potential buyers bid ...

Secure Error Correction using Multi-Party Computation

During recent years with the increase of data and data analysis needs, p...

Multiparty Protocol that Usually Shuffles

Multiparty computation is raising importance because it's primary object...

MPC-Friendly Commitments for Publicly Verifiable Covert Security

We address the problem of efficiently verifying a commitment in a two-pa...

Please sign up or login with your details

Forgot password? Click here to reset