Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing

被引:2
|
作者
Ohara, Kazuma [1 ,2 ]
Watanabe, Yohei [2 ,4 ,5 ]
Iwamoto, Mitsugu [2 ,3 ]
Ohta, Kazuo [2 ]
机构
[1] NEC Corp Ltd, Res Publ Key Cryptog & Secure Multiparty Comp, Tokyo 1088001, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
[3] Univ Electrocommun, Dept Informat, Chofu, Tokyo 1828585, Japan
[4] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
[5] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
multi-party computation; modular exponentiation; replicated secret sharing;
D O I
10.1587/transfun.E102.A.1079
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy computations like algebraic operations, as they require a large amount and number of communication proportional to the number of multiplications in the operations (which is not the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based three-party computation protocols for modular exponentiation, which is one of the most popular algebraic operations, on the case where the base is public and the exponent is private. Our proposed schemes are simple and efficient in both of the asymptotic and practical sense. On the asymptotic efficiency, the proposed schemes require O(n)-bit communication and O(1) rounds, where n is the secret-value size, in the best setting, whereas the previous scheme requires O(n(2))-bit communication and O(n) rounds. On the practical efficiency, we show the performance of our protocol by experiments on the scenario for distributed signatures, which is useful for secure key management on the distributed environment (e.g., distributed ledgers). As one of the cases, our implementation performs a modular exponentiation on a 3,072-bit discrete-log group and 256-bit exponent with roughly 300ms, which is an acceptable parameter for 128-bit security, even in the WAN setting.
引用
收藏
页码:1079 / 1090
页数:12
相关论文
共 50 条
  • [31] Secure Multi-party Comparing Protocol based on Multi-threshold Secret Sharing Scheme
    Liu Wen
    Luo Shou-shan
    Wang Yong-bin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [32] A trusted IoT data sharing method based on secure multi-party computation
    Ma, Li
    Duan, Binbin
    Zhang, Bo
    Li, Yang
    Fu, Yingxun
    Ma, Dongchao
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [33] Multi-Party Quantum Secret Sharing Protocol Based on GHZ States Entanglement Swapping
    Xu, Yuguang
    Li, Zexi
    Liu, Tianhua
    Zhu, Hongfeng
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (03)
  • [34] A Multi-party Quantum Key Agreement Protocol Based on Shamir's Secret Sharing
    Li, Lei
    Li, Zhi
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 3081 - 3090
  • [35] Multi-party Threshold Private Set Intersection Protocol Based on Robust Secret Sharing
    Zhang E.
    Qin L.-Y.
    Yang R.-L.
    Li G.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5424 - 5441
  • [36] Multi-Party Quantum Secret Sharing Protocol Based on GHZ States Entanglement Swapping
    Yuguang Xu
    Zexi Li
    Tianhua Liu
    Hongfeng Zhu
    International Journal of Theoretical Physics, 2022, 61
  • [37] A Multi-party Quantum Key Agreement Protocol Based on Shamir’s Secret Sharing
    Lei Li
    Zhi Li
    International Journal of Theoretical Physics, 2019, 58 : 3081 - 3090
  • [38] Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing
    Meraouche, Ishak
    Dutta, Sabyasachi
    Mohanty, Sraban Kumar
    Agudo, Isaac
    Sakurai, Kouichi
    IEEE ACCESS, 2022, 10 : 121329 - 121339
  • [39] A Verifiable Secret Sharing Scheme without Using Multi-Party Computations
    Makino, Takumi
    Kamidoi, Yoko
    Wakabayashi, Shin'ichi
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 845 - 850
  • [40] Multi-party d-Level Quantum Secret Sharing Scheme
    Heling Xiao
    Jingliang Gao
    International Journal of Theoretical Physics, 2013, 52 : 2075 - 2082