Co-operative Private Equality Test
نویسندگان
چکیده
We study the following problem: party A’s secret input is a, party B ’s secret input is b, and party C ’s input is empty; they want to know if a = b with restriction that A and B should not learn anything more than what is implied by their secret inputs and the comparison result, and C should not learn anything about a or b except if a = b. This problem can be seen as a variant of the socialist millionaires’ problem. We propose a simple and efficient protocol for this problem from a semantically homomorphic encryption scheme. The protocol is fair if party C is semi-honest.
منابع مشابه
Verifiable Homomorphic Oblivious Transfer and Private Equality Test
We describe slightly modified version (that we call the HOT protocol) of the Aiello-Ishai-Reingold oblivious transfer protocol from Eurocrypt 2001. In particular, the HOT protocol will be what we call weakly secure when coupled with many different homomorphic semantically secure public-key cryptosystems. Based on the HOT protocol, we construct an efficient verifiable oblivious transfer protocol...
متن کاملTHEORIES OF GENDER EQUALITY: Lessons from the Israeli Kibbutz
Because the Israeli kibbutz is innovative in collective ownership, production, consumption, and child care, and in part also because it is erroneously assumed to have once had a gender-egalitarian ideology and structure, it is taken to be a valid test case for many theories explaining or justifying gender inequality or gender equality. This article argues that the kibbutz cannot serve as a test...
متن کاملThe Investigation of the Consequences of Implementation of Targeted Subsidy upon Increase in Production costs of Agricultural Co-operative members of Lenjan
Agricultural cooperative is being considered as one of the most efficient agricultural system. Awarding subsidy to these bodies is one of the most important government supportive policies. It is argued that through implementation of the targeted subsidy and elimination of production subsidy, farmers affiliated with agricultural co-operatives due to increase in their production costs, become dis...
متن کاملTowards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization
In this paper we investigate a new category of public key encryption schemes which supports equality test between ciphertexts. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform equality test between their ciphertexts. We provide a formulation and a corresponding construction for this primitive, and our fo...
متن کاملPublic key encryption supporting plaintext equality test and user-specified authorization
In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext equality test from their ciphertexts. We provide a formal formulation for this primitive and present ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 1 شماره
صفحات -
تاریخ انتشار 2005