General secure multi-party computation from any linear secret-sharing scheme

被引:0
|
作者
Cramer, R [1 ]
Damgård, I
Maurer, U
机构
[1] Univ Aarhus, BRICS, DK-8000 Aarhus C, Denmark
[2] ETH Zurich, Zurich, Switzerland
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allows for the multiplication of shared values, an LSSS is an apparently much weaker primitive than VSS or MPC. Our approach to secure MPC is generic and applies to both the information-theoretic and the cryptographic setting. The construction is based on 1) a formalization of the special multiplicative property of an LSSS that is needed to perform a multiplication on shared values, 2) an efficient generic construction to obtain from any LSSS a multiplicative LSSS for the same access structure, and 3) an efficient generic construction to build verifiability into every LSSS (always assuming that the adversary structure allows for MPC or VSS at all). The protocols are efficient. In contrast to all previous information-theoretically secure protocols, the field size is not restricted (e.g, to be greater than n). Moreover, we exhibit adversary structures for which our protocols are polynomial in n while all previous approaches to MPC for non-threshold adversaries provably have super-polynomial complexity.
引用
收藏
页码:316 / 334
页数:19
相关论文
共 50 条
  • [31] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [32] A Verifiable Secret Sharing Scheme without Using Multi-Party Computations
    Makino, Takumi
    Kamidoi, Yoko
    Wakabayashi, Shin'ichi
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 845 - 850
  • [33] Multi-party d-Level Quantum Secret Sharing Scheme
    Heling Xiao
    Jingliang Gao
    International Journal of Theoretical Physics, 2013, 52 : 2075 - 2082
  • [34] Multi-party d-Level Quantum Secret Sharing Scheme
    Xiao, Heling
    Gao, Jingliang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (06) : 2075 - 2082
  • [35] Share conversion, pseudorandom secret-sharing and applications to secure computation
    Cramer, R
    Damgård, I
    Ishai, Y
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 342 - 362
  • [36] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [37] A secure delegation scheme of large polynomial computation in multi-party cloud
    Guo, Shu
    Xu, Haixia
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (01) : 1 - 7
  • [38] Effectively combined multi-party quantum secret sharing and secure direct communication
    Mahsa Khorrampanah
    Monireh Houshmand
    Optical and Quantum Electronics, 2022, 54
  • [39] Effectively combined multi-party quantum secret sharing and secure direct communication
    Khorrampanah, Mahsa
    Houshmand, Monireh
    Optical and Quantum Electronics, 2022, 54 (04):
  • [40] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209