An efficient secure comparison protocol

Zhenmin Lin, Jerzy W. Jaromczyk

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

We propose a new efficient cryptography-based secure comparison protocol for comparing secrets that are additively split between two parties. Our solution, based on homomorphic cryptosystems, needs 2N + 6 invocations of secure multiplications when the two secrets are numbers in the range [0, 2 N); previous solutions required 12N + O(1) secure multiplications. The protocol provides substantial performance improvement in privacy preserving data mining protocols that use comparison as a primitive operation. In particular, we experimentally evaluate the performance of our secure comparison protocol in the implementation of a secure k-means clustering protocol applied to several real datasets.

Original languageEnglish
Title of host publicationISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationCyberspace, Border, and Immigration Securities
Pages30-35
Number of pages6
DOIs
StatePublished - 2012
Event2012 10th IEEE International Conference on Intelligence and Security Informatics, ISI 2012 - Washington, DC, United States
Duration: Jun 11 2012Jun 14 2012

Publication series

NameISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities

Conference

Conference2012 10th IEEE International Conference on Intelligence and Security Informatics, ISI 2012
Country/TerritoryUnited States
CityWashington, DC
Period6/11/126/14/12

Keywords

  • k-means
  • privacy preserving data mining
  • secure comparison

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Fingerprint

Dive into the research topics of 'An efficient secure comparison protocol'. Together they form a unique fingerprint.

Cite this