Rational-security and fair two-party comparison protocol

Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the comparison result to Bob, Bob learned nothing about...

Full description

Saved in:
Bibliographic Details
Main Authors: Bowen ZHAO, Yao ZHU, Yang XIAO, Qingqi PEI, Xiaoguo LI, Ximeng LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2023-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023220/
Tags: Add Tag
No Tags, Be the first to tag this record!