The Cost of IEEE Arithmetic in Secure Computation

被引:2
|
作者
Archer, David W. [1 ]
Atapoor, Shahla [2 ]
Smart, Nigel P. [2 ,3 ]
机构
[1] Galois Inc, Portland, OR 97204 USA
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] Univ Bristol, Bristol, England
来源
关键词
MULTIPARTY COMPUTATION; MPC; CIRCUITS;
D O I
10.1007/978-3-030-88238-9_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmers are used to the rounding and error properties of IEEE double precision arithmetic, however in secure computing paradigms, such as provided by Multi-Party Computation (MPC), usually a different form of approximation is provided for real number arithmetic. We compare the two standard variants using for LSSS-based MPC, with an implementation of IEEE compliant double precision using binary circuit-based MPC. We compare the relative performance, and conclude that the addition cost of IEEE compliance maybe too great for some applications. Thus in the secure domain standards bodies may wish to examine a different form of real number approximations.
引用
收藏
页码:431 / 452
页数:22
相关论文
共 50 条
  • [21] Neural computation of arithmetic functions
    Siu, Kai-Yeung
    Bruck, Jehoshua
    1669, (78):
  • [22] On Computation Rates for Arithmetic Sum
    Tripathy, Ardhendu
    Ramamoorthy, Aditya
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2354 - 2358
  • [23] DEVELOPMENT OF EFFICIENT ARITHMETIC COMPUTATION
    KAYE, DB
    DEWINSTANLEY, P
    CHEN, Q
    BONNEFIL, V
    JOURNAL OF EDUCATIONAL PSYCHOLOGY, 1989, 81 (04) : 467 - 480
  • [24] TEACHING ARITHMETIC COMPUTATION SKILLS
    LEWIS, M
    EDUCATION OF THE VISUALLY HANDICAPPED, 1970, 2 (03): : 66 - 72
  • [25] THE DEVELOPMENT OF EFFICIENCY IN ARITHMETIC COMPUTATION
    KAYE, DB
    BONNEFIL, VL
    BULLETIN OF THE PSYCHONOMIC SOCIETY, 1983, 21 (05) : 357 - 358
  • [26] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [27] Secure Outsourced Computation
    Loftus, Jake
    Smart, Nigel P.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 1 - 20
  • [28] Introduction to secure computation
    Cramer, R
    LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 16 - 62
  • [29] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    COMPUTER, 2015, 48 (04) : 78 - 81
  • [30] Resettably Secure Computation
    Goyal, Vipul
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 54 - 71