Conditional Encrypted Mapping and Comparing Encrypted Numbers

Ian F. Blake,Vladimir Kolesnikov
DOI: https://doi.org/10.1007/11889663_18
2006-01-01
Abstract:We consider the problem of comparing two encrypted numbers and its extension – transferring one of the two secrets, depending on the result of comparison. We show how to efficiently apply our solutions to practical settings, such as auctions with the semi-honest auctioneer, proxy selling, etc. We propose a new primitive, Conditional Encrypted Mapping, which captures common security properties of one round protocols in a variety of settings, which may be of independent interest.
What problem does this paper attempt to address?