Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits

Takumi Kobayashi, Keisuke Hakuta. Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits. In Brent ByungHoon Kang, Jin Soo Jang, editors, Information Security Applications - 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers. Volume 11402 of Lecture Notes in Computer Science, pages 213-228, Springer, 2018. [doi]

@inproceedings{KobayashiH18,
  title = {Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits},
  author = {Takumi Kobayashi and Keisuke Hakuta},
  year = {2018},
  doi = {10.1007/978-3-030-17982-3_17},
  url = {https://doi.org/10.1007/978-3-030-17982-3_17},
  researchr = {https://researchr.org/publication/KobayashiH18},
  cites = {0},
  citedby = {0},
  pages = {213-228},
  booktitle = {Information Security Applications - 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers},
  editor = {Brent ByungHoon Kang and Jin Soo Jang},
  volume = {11402},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-030-17982-3},
}