General secure multi-party computation from any linear secret-sharing scheme

被引:0
|
作者
Cramer, R [1 ]
Damgård, I
Maurer, U
机构
[1] Univ Aarhus, BRICS, DK-8000 Aarhus C, Denmark
[2] ETH Zurich, Zurich, Switzerland
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allows for the multiplication of shared values, an LSSS is an apparently much weaker primitive than VSS or MPC. Our approach to secure MPC is generic and applies to both the information-theoretic and the cryptographic setting. The construction is based on 1) a formalization of the special multiplicative property of an LSSS that is needed to perform a multiplication on shared values, 2) an efficient generic construction to obtain from any LSSS a multiplicative LSSS for the same access structure, and 3) an efficient generic construction to build verifiability into every LSSS (always assuming that the adversary structure allows for MPC or VSS at all). The protocols are efficient. In contrast to all previous information-theoretically secure protocols, the field size is not restricted (e.g, to be greater than n). Moreover, we exhibit adversary structures for which our protocols are polynomial in n while all previous approaches to MPC for non-threshold adversaries provably have super-polynomial complexity.
引用
收藏
页码:316 / 334
页数:19
相关论文
共 50 条
  • [1] Multi-party computation enables secure polynomial control based solely on secret-sharing
    Schlor, Sebastian
    Hertneck, Michael
    Wildhagen, Stefan
    Allgower, Frank
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4882 - 4887
  • [2] On codes, matroids and secure multi-party computation from linear secret sharing schemes
    Cramer, R
    Daza, V
    Gracia, I
    Urroz, JJ
    Leander, G
    Martí-Farré, J
    Padró, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 327 - 343
  • [3] Multi-party computation from any linear secret sharing scheme unconditionally secure against adaptive adversary: The zero-error case
    Nikov, V
    Nikova, S
    Preneel, B
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 1 - 15
  • [4] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [5] Efficient multi-party quantum secret-sharing protocol
    Xin, Xiangjun
    He, Fan
    Qiu, Shujing
    Li, Chaoyang
    Li, Fagen
    CHINESE JOURNAL OF PHYSICS, 2024, 92 : 664 - 674
  • [6] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 112 - 116
  • [7] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116
  • [8] Parallel multi-party computation from linear multi-secret sharing schemes
    Zhang, ZF
    Liu, ML
    Xiao, LL
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 156 - 173
  • [9] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [10] Multi-party computation with conversion of secret sharing
    Ghodosi, Hossein
    Pieprzyk, Josef
    Steinfeld, Ron
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (03) : 259 - 272