{"id":"https://openalex.org/W7131461502","doi":"https://doi.org/10.48550/arxiv.2602.19604","title":"Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance","display_name":"Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance","publication_year":2026,"publication_date":"2026-02-23","ids":{"openalex":"https://openalex.org/W7131461502","doi":"https://doi.org/10.48550/arxiv.2602.19604"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.19604","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19604","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.19604","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126808960","display_name":"Kaiwen Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wang, Kaiwen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126833653","display_name":"Xiaolin Chang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chang, Xiaolin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126693225","display_name":"Yuehan Dong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dong, Yuehan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126814178","display_name":"Ruichen Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Ruichen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5126808960"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7299000024795532},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6987000107765198},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.642799973487854},{"id":"https://openalex.org/keywords/software-portability","display_name":"Software portability","score":0.6137999892234802},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5989000201225281},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.5095000267028809},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47609999775886536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8330000042915344},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7299000024795532},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6987000107765198},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.642799973487854},{"id":"https://openalex.org/C63000827","wikidata":"https://www.wikidata.org/wiki/Q3080428","display_name":"Software portability","level":2,"score":0.6137999892234802},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5989000201225281},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.5095000267028809},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47609999775886536},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47350001335144043},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4684999883174896},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4431000053882599},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.3346000015735626},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C206175624","wikidata":"https://www.wikidata.org/wiki/Q595731","display_name":"Branching (polymer chemistry)","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.19604","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19604","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.19604","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.19604","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.4154401123523712,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Secure":[0],"comparison":[1,24,75],"is":[2,26],"a":[3,45,66],"fundamental":[4],"primitive":[5],"in":[6,23],"multi-party":[7],"computation,":[8],"supporting":[9],"privacy-preserving":[10],"applications":[11],"such":[12],"as":[13,65,163],"machine":[14],"learning":[15],"and":[16,110,120,147,176],"data":[17],"analytics.":[18],"A":[19],"critical":[20],"performance":[21],"bottleneck":[22],"protocols":[25,84,116,160,195],"their":[27],"preprocessing":[28,71],"phase,":[29],"primarily":[30],"due":[31],"to":[32,49,77,135,183],"the":[33,38,63,74,79,104,126,132,191],"high":[34],"cost":[35],"of":[36,193],"generating":[37],"necessary":[39],"correlated":[40,138],"randomness.":[41],"Recent":[42],"frameworks":[43],"introduce":[44],"passive,":[46],"non-colluding":[47],"dealer":[48,64],"accelerate":[50],"preprocessing.":[51],"However,":[52],"two":[53],"key":[54],"issues":[55],"still":[56],"remain.":[57],"First,":[58],"existing":[59],"dealer-assisted":[60,106],"approaches":[61],"treat":[62],"drop-in":[67],"replacement":[68],"for":[69,87,196],"conventional":[70],"without":[72],"redesigning":[73],"protocol":[76,127],"optimize":[78],"online":[80,145],"phase.":[81],"Second,":[82],"most":[83],"are":[85,161],"specialized":[86],"particular":[88],"algebraic":[89],"domains,":[90],"adversary":[91,177],"models,":[92],"or":[93],"party":[94],"configurations,":[95],"lacking":[96],"broad":[97],"generality.":[98],"In":[99],"this":[100],"work,":[101],"we":[102],"present":[103],"first":[105],"$n$-party":[107],"LTBits":[108],"(Less-Than-Bits)":[109],"MSB":[111],"(Most":[112],"Significant":[113],"Bit)":[114],"extraction":[115],"over":[117,186],"both":[118],"$\\mathbb{F}_p$":[119,141],"$\\mathbb{Z}_{2^k}$,":[121],"achieving":[122],"perfect":[123],"security":[124],"at":[125],"level.":[128],"By":[129],"fully":[130],"exploiting":[131],"dealer's":[133],"capability":[134],"generate":[136],"rich":[137],"randomness,":[139],"our":[140,148,194],"construction":[142,150],"achieves":[143,151],"constant-round":[144],"complexity":[146],"$\\mathbb{Z}_{2^k}$":[149],"$O(\\log_n":[152],"k)$":[153],"rounds":[154],"with":[155],"tunable":[156],"branching":[157],"factor.":[158],"All":[159],"formulated":[162],"black-box":[164],"constructions":[165],"via":[166],"an":[167],"extended":[168],"ABB":[169],"model,":[170],"ensuring":[171],"portability":[172],"across":[173],"MPC":[174,188,198],"backends":[175],"models.":[178],"Experimental":[179],"results":[180],"demonstrate":[181],"$1.79\\times$":[182],"$19.4\\times$":[184],"speedups":[185],"state-of-the-art":[187],"frameworks,":[189],"highlighting":[190],"practicality":[192],"comparison-intensive":[197],"applications.":[199]},"counts_by_year":[],"updated_date":"2026-02-26T06:34:08.959763","created_date":"2026-02-26T00:00:00"}
