Rational-security and fair two-party comparison protocol

Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about...

Full description

Saved in:
Bibliographic Details
Main Authors: Bowen ZHAO, Yao ZHU, Yang XIAO, Qingqi PEI, Xiaoguo LI, Ximeng LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2023-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023220/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841540086553903104
author Bowen ZHAO
Yao ZHU
Yang XIAO
Qingqi PEI
Xiaoguo LI
Ximeng LIU
author_facet Bowen ZHAO
Yao ZHU
Yang XIAO
Qingqi PEI
Xiaoguo LI
Ximeng LIU
author_sort Bowen ZHAO
collection DOAJ
description Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about the comparison result, which broke the fairness of the two-party comparison protocol.Based on this, a rational-security and fair two-party comparison protocol TEAM was proposed by seamlessly combining the threshold Paillier cryptosystem and game theory.Specifically, a novel secure two-party comparison protocol based on the threshold Paillier cryptosystem was designed and then searched for equilibrium points at which two parties could obtain comparison results.Strict theoretical analysis demonstrate that TEAM guarantees rational two-party to always obtain the comparison result without sacrificing any of their inputs.In other words, TEAM was correct, secure, and fair.In addition, the experimental results show that TEAM improves up to 50 times in terms of efficiency compared with previous methods under the same experimental settings.
format Article
id doaj-art-fd67a16bb26741b782053c59c795e792
institution Kabale University
issn 1000-436X
language zho
publishDate 2023-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-fd67a16bb26741b782053c59c795e7922025-01-14T06:22:28ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-12-014411212359384536Rational-security and fair two-party comparison protocolBowen ZHAOYao ZHUYang XIAOQingqi PEIXiaoguo LIXimeng LIUExisting secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about the comparison result, which broke the fairness of the two-party comparison protocol.Based on this, a rational-security and fair two-party comparison protocol TEAM was proposed by seamlessly combining the threshold Paillier cryptosystem and game theory.Specifically, a novel secure two-party comparison protocol based on the threshold Paillier cryptosystem was designed and then searched for equilibrium points at which two parties could obtain comparison results.Strict theoretical analysis demonstrate that TEAM guarantees rational two-party to always obtain the comparison result without sacrificing any of their inputs.In other words, TEAM was correct, secure, and fair.In addition, the experimental results show that TEAM improves up to 50 times in terms of efficiency compared with previous methods under the same experimental settings.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023220/secure comparisongame theoryhomomorphic encryptionthreshold cryptographytrusted computing
spellingShingle Bowen ZHAO
Yao ZHU
Yang XIAO
Qingqi PEI
Xiaoguo LI
Ximeng LIU
Rational-security and fair two-party comparison protocol
Tongxin xuebao
secure comparison
game theory
homomorphic encryption
threshold cryptography
trusted computing
title Rational-security and fair two-party comparison protocol
title_full Rational-security and fair two-party comparison protocol
title_fullStr Rational-security and fair two-party comparison protocol
title_full_unstemmed Rational-security and fair two-party comparison protocol
title_short Rational-security and fair two-party comparison protocol
title_sort rational security and fair two party comparison protocol
topic secure comparison
game theory
homomorphic encryption
threshold cryptography
trusted computing
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023220/
work_keys_str_mv AT bowenzhao rationalsecurityandfairtwopartycomparisonprotocol
AT yaozhu rationalsecurityandfairtwopartycomparisonprotocol
AT yangxiao rationalsecurityandfairtwopartycomparisonprotocol
AT qingqipei rationalsecurityandfairtwopartycomparisonprotocol
AT xiaoguoli rationalsecurityandfairtwopartycomparisonprotocol
AT ximengliu rationalsecurityandfairtwopartycomparisonprotocol