Secure computation of the vector dominance problem

  • Authors:
  • Jin Yuan;Qingsong Ye;Huaxiong Wang;Josef Pieprzyk

  • Affiliations:
  • Center for Advanced Computing-Algorithms and Cryptography, Department of Computing, Macquarie University, NSW, Australia;Center for Advanced Computing-Algorithms and Cryptography, Department of Computing, Macquarie University, NSW, Australia;Center for Advanced Computing-Algorithms and Cryptography, Department of Computing, Macquarie University, NSW, Australia and Division of Mathematical Sciences, Nanyang Technological University, Si ...;Center for Advanced Computing-Algorithms and Cryptography, Department of Computing, Macquarie University, NSW, Australia

  • Venue:
  • ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Suppose two parties, holding vectors A = (a1, a2,..., an) and B = (b1, b2,..., bn) respectively, wish to know whether ai bi for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao's millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.