The Cost of IEEE Arithmetic in Secure Computation

被引:2
|
作者
Archer, David W. [1 ]
Atapoor, Shahla [2 ]
Smart, Nigel P. [2 ,3 ]
机构
[1] Galois Inc, Portland, OR 97204 USA
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] Univ Bristol, Bristol, England
来源
关键词
MULTIPARTY COMPUTATION; MPC; CIRCUITS;
D O I
10.1007/978-3-030-88238-9_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmers are used to the rounding and error properties of IEEE double precision arithmetic, however in secure computing paradigms, such as provided by Multi-Party Computation (MPC), usually a different form of approximation is provided for real number arithmetic. We compare the two standard variants using for LSSS-based MPC, with an implementation of IEEE compliant double precision using binary circuit-based MPC. We compare the relative performance, and conclude that the addition cost of IEEE compliance maybe too great for some applications. Thus in the secure domain standards bodies may wish to examine a different form of real number approximations.
引用
收藏
页码:431 / 452
页数:22
相关论文
共 50 条
  • [41] Secure computation for data privacy
    Singh, Meena
    Saxena, Ashutosh
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
  • [42] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [43] Secure Computation for Big Data
    Malkin, Tal
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 355 - 355
  • [44] Secure Computation from Millionaire
    Shelat, Abhi
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 736 - 757
  • [45] Secure Computation Without Authentication
    Boaz Barak
    Ran Canetti
    Yehuda Lindell
    Rafael Pass
    Tal Rabin
    Journal of Cryptology, 2011, 24 : 720 - 760
  • [46] Private Secure Coded Computation
    Kim, Minchul
    Lee, Jungwoo
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1097 - 1101
  • [47] Secure Computation in a Bidirectional Relay
    Kashyap, Navin
    Shashank, V
    Thangaraj, Andrew
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [48] Secure computation without computers
    D'Arco, Paolo
    De Prisco, Roberto
    THEORETICAL COMPUTER SCIENCE, 2016, 651 : 11 - 36
  • [49] Secure assisted quantum computation
    Childs, AM
    QUANTUM INFORMATION & COMPUTATION, 2005, 5 (06) : 456 - 466
  • [50] Optimistic fair secure computation
    Cachin, C
    Camenisch, J
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 93 - 111