Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security

被引:0
|
作者
Ning, Chao [1 ]
Xu, Qiuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
来源
关键词
Multi-party Computation; Perfectly Secure; Constant-Rounds; Linear; Exponentiation; Modulo Reduction; Bit-Decomposition; BIT-DECOMPOSITION; EQUALITY; SECRET;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bit-decomposition is an important primitive in multi-party computation (MPC). With the help of bit-decomposition, we will be able to construct constant-rounds protocols for various MPC problems, such as equality test, comparison, public modulo reduction and private exponentiation, which are four main applications of bit-decomposition. However, when considering perfect security, bit-decomposition does not have a linear communication complexity; thus any protocols involving bit-decomposition inherit this inefficiency. Constructing protocols for MPC problems without relying on bit-decomposition is a meaningful work because this may provide us with perfectly secure protocols with linear communication complexity. It is already proved that equality test, comparison and public modulo reduction can be solved without involving bit-decomposition and the communication complexity can be reduced to linear. However, it remains an open problem whether private exponentiation could be done without relying on bit-decomposition. In this paper, maybe somewhat surprisingly, we show that it can. That is to say, we construct a constant-rounds, linear, perfectly secure protocol for private exponentiation without relying on bit-decomposition though it seems essential to this problem. In a recent work, Ning and Xu proposed a generalization of bit-decomposi-tion and, as a simplification of their generalization, they also proposed a linear protocol for public modulo reduction. In this paper, we show that their generalization can be further generalized; more importantly, as a simplification of our further generalization, we propose a public modulo reduction protocol which is more efficient than theirs.
引用
收藏
页码:572 / 589
页数:18
相关论文
共 34 条
  • [31] SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things
    Li, Cheng
    Yang, Li
    Yu, Shui
    Qin, Wenjing
    Ma, Jianfeng
    INFORMATION SCIENCES, 2022, 612 : 151 - 167
  • [32] More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate
    Wang, Yongjun
    Xiong, Kun
    Tang, Yongli
    Yang, Li
    Zhang, Jing
    Yan, Xixi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 79
  • [33] Enhancing Blockchain Security Against Data Tampering: Leveraging Hybrid Model in Multimedia Forensics and Multi-Party Computation for Supply Chain Data Protection
    Islam, Umar
    Alshammari, Abdullah
    Alzaid, Zaid
    Ahmed, Adeel
    Abdullah, Saima
    Iftikhar, Saman
    Bawazeer, Shaikhan
    Izhar, Muhammad
    IEEE ACCESS, 2024, 12 : 111007 - 111020
  • [34] Multi-party computation from any linear secret sharing scheme unconditionally secure against adaptive adversary: The zero-error case
    Nikov, V
    Nikova, S
    Preneel, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 1 - 15