Protocols for secure comparison are a fundamental building block of many privacy-preserving protocols such as privacy-preserving face recognition or privacy-preserving fingerprint authentication. So far, all existing secure comparison protocols that have been used in practical implementations require interaction.
Chao-Yung HsuChun-Shien LuSoo‐Chang Pei
Linzhi JiangChunxiang XuXiaofang WangBo LuoHuaqun Wang
Pranjali M MarnePravin M. Kamde
Xiang LiuXueli ZhaoZhihua XiaFeng QianPeipeng YuJian Weng
Tengfei YangJianfeng MaQian WangYinbin MiaoXuan WangQian Meng