Comparing Information Without Leaking It

Discussion

This is a rather open-ended question. However, we can judge a proposed solution according to these criteria who may not be all simultaneously achievable.

Cryptographic research on this problem (and the more general problem of ``secure function evaluation") has been very fertile. The resulting solution are quite satisfactory in all the above criteria except for simplicity. Try and think of a simple solution that ranks high on as many properties as possible. Ron Fagin, Moni Naor and Peter Winkler have collected and evaluated many proposals in this paper (Abstract, Postscript, gzipped Postscript). A more technical paper on a related subject written by Uriel Feige , Joe Kilian and Moni Naor is available (Postscript, gzipped Postscript). We would be glad to hear of any different proposal.


A (favorite) solution

Back to the puzzle


Back to the Puzzler page