5 research outputs found

    Conditional Encrypted Mapping and Comparing Encrypted Numbers

    No full text
    We consider the problem of comparing two encrypted numbers and its extension -- transferring one of the two secrets, depending on the result of comparison. We show how to e#ciently apply our solutions to practical settings, such as auctions with the semi-honest auctioneer, proxy selling, etc. We propose a new primitive, Conditional Encrypted Mapping, which captures common security properties of one round protocols in a variety of settings, which may be of independent interest
    corecore