Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security

被引:0
|
作者
Ning, Chao [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
来源
关键词
Multi-party Computation; Perfectly Secure; Constant-Rounds; Linear; Exponentiation; Modulo Reduction; Bit-Decomposition; BIT-DECOMPOSITION; EQUALITY; SECRET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bit-decomposition is an important primitive in multi-party computation (MPC). With the help of bit-decomposition, we will be able to construct constant-rounds protocols for various MPC problems, such as equality test, comparison, public modulo reduction and private exponentiation, which are four main applications of bit-decomposition. However, when considering perfect security, bit-decomposition does not have a linear communication complexity; thus any protocols involving bit-decomposition inherit this inefficiency. Constructing protocols for MPC problems without relying on bit-decomposition is a meaningful work because this may provide us with perfectly secure protocols with linear communication complexity. It is already proved that equality test, comparison and public modulo reduction can be solved without involving bit-decomposition and the communication complexity can be reduced to linear. However, it remains an open problem whether private exponentiation could be done without relying on bit-decomposition. In this paper, maybe somewhat surprisingly, we show that it can. That is to say, we construct a constant-rounds, linear, perfectly secure protocol for private exponentiation without relying on bit-decomposition though it seems essential to this problem. In a recent work, Ning and Xu proposed a generalization of bit-decomposi-tion and, as a simplification of their generalization, they also proposed a linear protocol for public modulo reduction. In this paper, we show that their generalization can be further generalized; more importantly, as a simplification of our further generalization, we propose a public modulo reduction protocol which is more efficient than theirs.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 34 条
  • [1] Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    Damgard, Ivan
    Fitzi, Matthias
    Kiltz, Eike
    Nielsen, Jesper Buus
    Toft, Tomas
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 285 - 304
  • [2] Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum
    Ohara, Kazuma
    Ohta, Kazuo
    Suzuki, Koutarou
    Yoneyama, Kazuki
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 285 - 299
  • [3] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [4] Secure Multi-party Computation Minimizing Online Rounds
    Choi, Seung Geol
    Elbaz, Ariel
    Malkin, Tal
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 268 - 286
  • [5] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing
    Ohara, Kazuma
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1079 - 1090
  • [6] Application of Randomness for Security and Privacy in Multi-Party Computation
    Saha, Rahul
    Kumar, Gulshan
    Geetha, G.
    Conti, Mauro
    Buchanan, William J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5694 - 5705
  • [7] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [8] Efficient Constant Round Multi-party Computation Combining BMR and SPDZ
    Lindell, Yehuda
    Pinkas, Benny
    Smart, Nigel P.
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 319 - 338
  • [9] Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals
    Harmon, Luke
    Delavignette, Gaetan
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 309 - 326
  • [10] Multi-party Computation for Privacy and Security in Machine Learning: a practical review
    Bellini, Alessandro
    Bellini, Emanuele
    Bertini, Massimo
    Almhaithawi, Doaa
    Cuomo, Stefano
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 174 - 179