Journal on Communications ›› 2023, Vol. 44 ›› Issue (12): 112-123.doi: 10.11959/j.issn.1000-436x.2023220

• Papers • Previous Articles    

Rational-security and fair two-party comparison protocol

Bowen ZHAO1, Yao ZHU1, Yang XIAO2, Qingqi PEI2, Xiaoguo LI3, Ximeng LIU4   

  1. 1 Guangzhou Institute of Technology, Xidian University, Guangzhou 510555, China
    2 Xidian University State Key Laboratory of Integrated Service Networks, Xi’an 710071, China
    3 School of Computing and Information Systems, Singapore Management University, Singapore 178902, Singapore
    4 College of Computer and Data Science, Fuzhou University, Fuzhou 350108, China
  • Revised:2023-12-01 Online:2023-12-01 Published:2023-12-01
  • Supported by:
    The National Key Research and Development Program of China(2022YFB3102700);The National Natural Science Foundation of China(62202358);The National Natural Science Foundation of China(62072109);The National Natural Science Foundation of China(62376097);The National Natural Science Foundation of China(62102295);The National Natural Science Foundation of China(62202114);China Postdoctoral Science Foundation(2023TQ0258)

Abstract:

Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about the comparison result, which broke the fairness of the two-party comparison protocol.Based on this, a rational-security and fair two-party comparison protocol TEAM was proposed by seamlessly combining the threshold Paillier cryptosystem and game theory.Specifically, a novel secure two-party comparison protocol based on the threshold Paillier cryptosystem was designed and then searched for equilibrium points at which two parties could obtain comparison results.Strict theoretical analysis demonstrate that TEAM guarantees rational two-party to always obtain the comparison result without sacrificing any of their inputs.In other words, TEAM was correct, secure, and fair.In addition, the experimental results show that TEAM improves up to 50 times in terms of efficiency compared with previous methods under the same experimental settings.

Key words: secure comparison, game theory, homomorphic encryption, threshold cryptography, trusted computing

CLC Number: 

No Suggested Reading articles found!