Title :
Improving the DGK comparison protocol
Author_Institution :
Inf. Security & Privacy Lab., Delft Univ. of Technol., Delft, Netherlands
Abstract :
When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison protocol is by Damgard, Geisler and Kroigaard. We present two ways of improving this comparison protocol. Firstly, we reduce the computational effort of one party by roughly 50%. Secondly, we show how to achieve perfect security towards the other party without additional costs, whereas the original version with encrypted inputs only achieved statistical security. An additional advantage is that larger inputs are allowed.
Keywords :
cryptographic protocols; statistical analysis; DGK comparison protocol; encrypted data; encrypted domain; homomorphic encryption; linear operations; perfect security; statistical security; Computational complexity; Computational modeling; Encryption; Optimization; Protocols;
Conference_Titel :
Information Forensics and Security (WIFS), 2012 IEEE International Workshop on
Conference_Location :
Tenerife
Print_ISBN :
978-1-4673-2285-0
Electronic_ISBN :
978-1-4673-2286-7
DOI :
10.1109/WIFS.2012.6412624