Secure two-party integer comparison protocol without any third party.
Runhua ShiBai LiuMingwu ZhangPublished in: Quantum Inf. Process. (2021)
Keyphrases
- third party
- trusted third party
- key agreement protocol
- cryptographic protocols
- sensitive data
- sensitive information
- lightweight
- covert channel
- personal information
- scalar product
- authentication protocol
- security model
- security protocols
- key distribution
- group communication
- reverse logistics
- private information
- semi honest
- rfid systems
- security analysis
- fair exchange
- diffie hellman
- security services
- homomorphic encryption
- secure routing
- key exchange protocol
- fair exchange protocols
- data providers
- key management
- multi party
- mashup
- privacy preserving