Yao introduced the “millionaire problem”, in which two parties want to determine who is richer without disclosing anything else about their wealth. This problem deals with single comparison situation; however, in many applications, one often encounters situations where one wants to make multiple comparisons in an “all-or-nothing” fashion: Alice has an n-dimensional vector A = (a 1; : : : ; an), and Bob has another n-dimensional vector B = (b1; : : : ; bn). Alice wants to know whether A dominatesB, i.e. whetherfor all i = 1; : : : ; n, ai > bi. If 9i such thatai < bi, then both parties should learn nothing about the other party’s information, including any partial information, such as the relationship between any a i, bi pair, for i = 1; : : : ; n. This problem cannot be solved by just using the solution to Yao’s Millionaire Problemn times, once for each dimension: That would inappropriately reveal the relative ordering of individual ai; bi pairs in the case where the answer to the domination question is “no”. We propose a novel and efficient solution to this multi-dimensional Yao’s Millionaire Problem. The communication complexity of our scheme is linear in the number of bits needed to represent Alice’s and bob’s vectors.
[1]
Silvio Micali,et al.
Computationally Private Information Retrieval with Polylogarithmic Communication
,
1999,
EUROCRYPT.
[2]
Rafail Ostrovsky,et al.
Replication is not needed: single database, computationally-private information retrieval
,
1997,
Proceedings 38th Annual Symposium on Foundations of Computer Science.
[3]
Tal Malkin,et al.
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication
,
1998,
RANDOM.
[4]
Christian Cachin,et al.
Efficient private bidding and auctions with an oblivious third party
,
1999,
CCS '99.
[5]
Andrew Chi-Chih Yao,et al.
Protocols for secure computations
,
1982,
FOCS 1982.
[6]
Michael Ian Shamos,et al.
Computational geometry: an introduction
,
1985
.
[7]
Eyal Kushilevitz,et al.
Private information retrieval
,
1998,
JACM.
[8]
Shafi Goldwasser,et al.
Multi party computations: past and present
,
1997,
PODC '97.
[9]
Silvio Micali,et al.
How to play ANY mental game
,
1987,
STOC.
[10]
Bernard P. Zajac.
Applied cryptography: Protocols, algorithms, and source code in C
,
1994
.