Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing

被引:2
|
作者
Ohara, Kazuma [1 ,2 ]
Watanabe, Yohei [2 ,4 ,5 ]
Iwamoto, Mitsugu [2 ,3 ]
Ohta, Kazuo [2 ]
机构
[1] NEC Corp Ltd, Res Publ Key Cryptog & Secure Multiparty Comp, Tokyo 1088001, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
[3] Univ Electrocommun, Dept Informat, Chofu, Tokyo 1828585, Japan
[4] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
[5] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
multi-party computation; modular exponentiation; replicated secret sharing;
D O I
10.1587/transfun.E102.A.1079
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy computations like algebraic operations, as they require a large amount and number of communication proportional to the number of multiplications in the operations (which is not the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based three-party computation protocols for modular exponentiation, which is one of the most popular algebraic operations, on the case where the base is public and the exponent is private. Our proposed schemes are simple and efficient in both of the asymptotic and practical sense. On the asymptotic efficiency, the proposed schemes require O(n)-bit communication and O(1) rounds, where n is the secret-value size, in the best setting, whereas the previous scheme requires O(n(2))-bit communication and O(n) rounds. On the practical efficiency, we show the performance of our protocol by experiments on the scenario for distributed signatures, which is useful for secure key management on the distributed environment (e.g., distributed ledgers). As one of the cases, our implementation performs a modular exponentiation on a 3,072-bit discrete-log group and 256-bit exponent with roughly 300ms, which is an acceptable parameter for 128-bit security, even in the WAN setting.
引用
收藏
页码:1079 / 1090
页数:12
相关论文
共 50 条
  • [1] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [2] Multi-party computation with conversion of secret sharing
    Ghodosi, Hossein
    Pieprzyk, Josef
    Steinfeld, Ron
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (03) : 259 - 272
  • [3] Linear multi-secret sharing schemes based on multi-party computation
    Liu, Mulan
    Xiao, Liangliang
    Zhang, Zhifang
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 704 - 713
  • [4] Dynamic Multi-Party to Multi-Party Quantum Secret Sharing based on Bell States
    Tian, Yuan
    Wang, Jialong
    Bian, Genqing
    Chang, Jinyong
    Li, Jian
    ADVANCED QUANTUM TECHNOLOGIES, 2024, 7 (07)
  • [5] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 112 - 116
  • [6] EFFICIENT MULTI-PARTY COMPUTATION WITH COLLUSION-DETERRED SECRET SHARING
    Wang, Zhaohong
    Luo, Ying
    Cheung, Sen-ching
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [7] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116
  • [8] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [9] Threshold quantum secret sharing between multi-party and multi-party
    YANG YuGuang1
    2 State Key Laboratory of Integrated Services Network
    3 State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences)
    4 State Key Laboratory of Networking and Switching Technology
    Science China(Physics,Mechanics & Astronomy), 2008, (09) : 1308 - 1315
  • [10] Threshold quantum secret sharing between multi-party and multi-party
    YuGuang Yang
    QiaoYan Wen
    Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1308 - 1315