Secure integer comparison has been a popular research topic in cryptography,
both for its simplicity to describe and for its applications. The aim is to
enable two parties to compare their inputs without revealing the exact value of
those inputs.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

In this paper, we highlight three-party integer comparison (TPIC), where a
emph{judge}, with no private input, wants to know the comparison result, while
two emph{competitors} hold secret integers to do privacy-preserving
comparison. The judge actively obtains the result rather than passively waiting
for it sent by a competitor. We give two TPIC constructions considering
emph{Mixed adversaries}, who have with different capabilities. One is secure
against a semi-honest adversary with low computation and communication cost,
while the other is secure against a malicious adversary.

Basing on TPIC, we present multi-party comparisons through concrete
applications, including a joint bidding scheme and a practical auction. Brief
security proofs and analysis for the applications are presented. In comparison,
our auction scheme is more efficient with lower cost, making it feasible in
practice rather than a theoretical design. All the comparisons and application
schemes run on top of blockchain requiring a constant number of rounds.

By admin