Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience

被引:0
|
作者
Patra, Arpita [1 ]
Choudhary, Ashish [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
来源
关键词
SECURE MULTIPARTY COMPUTATION; ROUND COMPLEXITY; PROTOCOLS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new statistical asynchronous verifiable secret sharing (AVSS) protocol with optimal resilience; i.e. with n = 3t + 1, where n is the total number of participating parties and t is the maximum number of parties that can be under the control of a computationally unbounded active adversary A(t). Our protocol privately communicates O((ln(3) + n(4)kappa)kappa) bits and A-casts O(n(3) log(n)) bits to simultaneously share l >= 1 elements from a finite field F, where kappa is the error parameter. There are only two known statistical AVSS protocols with n = 3t + 1, reported in [11] and [26]. The AVSS protocol of [11] requires a private communication of O(n(9)kappa(4)) bits and A-cast of O(n(9)kappa(2) log(n)) bits to share a single element from F. Thus our AVSS protocol shows a significant improvement in communication complexity over the AVSS of [11]. The AVSS protocol of [26] requires a private communication of O((ln(3) + n(4))kappa) bits and A-cast of O((ln(3) + n(4))kappa) bits to share l >= 1 elements. However, the shared element(s) may be NULL is not an element of F. Thus our AVSS is better than the AVSS of [26] due to two reasons: (a) The A-cast communication of our AVSS is independent of the number of secrets i.e. l; (b) Our AVSS makes sure that the shared value(s) always belong to F. Using our AVSS, we design a new primitive called Asynchronous Complete Secret Sharing (ACSS) which is an essential building block of asynchronous multiparty computation (AMPC). Using our ACSS scheme, we can design a statistical AMPC with optimal resilience; i.e., with n = 3t + 1, that privately communicates O(n(5) kappa) bits per multiplication gate. This will significantly improve the only known statistical AMPC of [8] with n = 3t + 1, which privately communicates Omega(n(11) kappa(4)) bits and A-cast Omega(n(11) kappa(2) log(n)) bits per multiplication gate.
引用
收藏
页码:74 / 92
页数:19
相关论文
共 50 条
  • [1] Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
    Shoup, Victor
    Smart, Nigel P.
    [J]. JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [2] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 49 - 109
  • [3] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Arpita Patra
    Ashish Choudhury
    C. Pandu Rangan
    [J]. Journal of Cryptology, 2015, 28 : 49 - 109
  • [4] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342
  • [5] Linear-Communication Asynchronous Complete Secret Sharing with Optimal Resilience
    Ji, Xiaoyu
    Li, Junru
    Song, Yifan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VIII, 2024, 14927 : 418 - 453
  • [6] Broadcast (and Round) Efficient Verifiable Secret Sharing
    Garay, Juan
    Givens, Clint
    Ostrovsky, Rafail
    Raykov, Pavel
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 200 - 219
  • [7] The Round Complexity of Verifiable Secret Sharing: The Statistical Case
    Kumaresan, Ranjit
    Patra, Arpita
    Rangan, C. Pandu
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 431 - +
  • [8] Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 179 - 197
  • [9] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [10] Verifiable Secret Sharing with Comprehensive and Efficient Public Verification
    Peng, Kun
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 217 - 230