Rational-security and fair two-party comparison protocol
Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about...
Saved in:
Main Authors: | Bowen ZHAO, Yao ZHU, Yang XIAO, Qingqi PEI, Xiaoguo LI, Ximeng LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023220/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Provably secure rational delegation computation protocol
by: Youliang TIAN, et al.
Published: (2019-07-01) -
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
by: Min Hou, et al.
Published: (2025-01-01) -
Adaptive federated learning secure aggregation scheme based on threshold homomorphic encryption
by: Zhuo MA, et al.
Published: (2023-07-01) -
Novel identity-based fully homomorphic encryption scheme from lattice
by: Yong-li TANG, et al.
Published: (2017-05-01) -
Design for secure two-party computation protocol based on ElGamal variant’s homomorphic
by: Zhi-wei CHEN, et al.
Published: (2015-02-01)