Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing

被引:2
|
作者
Ohara, Kazuma [1 ,2 ]
Watanabe, Yohei [2 ,4 ,5 ]
Iwamoto, Mitsugu [2 ,3 ]
Ohta, Kazuo [2 ]
机构
[1] NEC Corp Ltd, Res Publ Key Cryptog & Secure Multiparty Comp, Tokyo 1088001, Japan
[2] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
[3] Univ Electrocommun, Dept Informat, Chofu, Tokyo 1828585, Japan
[4] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
[5] Natl Inst Informat & Commun Technol NICT, Tokyo, Japan
关键词
multi-party computation; modular exponentiation; replicated secret sharing;
D O I
10.1587/transfun.E102.A.1079
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy computations like algebraic operations, as they require a large amount and number of communication proportional to the number of multiplications in the operations (which is not the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based three-party computation protocols for modular exponentiation, which is one of the most popular algebraic operations, on the case where the base is public and the exponent is private. Our proposed schemes are simple and efficient in both of the asymptotic and practical sense. On the asymptotic efficiency, the proposed schemes require O(n)-bit communication and O(1) rounds, where n is the secret-value size, in the best setting, whereas the previous scheme requires O(n(2))-bit communication and O(n) rounds. On the practical efficiency, we show the performance of our protocol by experiments on the scenario for distributed signatures, which is useful for secure key management on the distributed environment (e.g., distributed ledgers). As one of the cases, our implementation performs a modular exponentiation on a 3,072-bit discrete-log group and 256-bit exponent with roughly 300ms, which is an acceptable parameter for 128-bit security, even in the WAN setting.
引用
收藏
页码:1079 / 1090
页数:12
相关论文
共 50 条
  • [41] Multi-party d-Level Quantum Secret Sharing Scheme
    Xiao, Heling
    Gao, Jingliang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (06) : 2075 - 2082
  • [42] Multi-party Computation Based on Physical Coins
    Komano, Yuichi
    Mizuki, Takaaki
    THEORY AND PRACTICE OF NATURAL COMPUTING (TPNC 2018), 2018, 11324 : 87 - 98
  • [43] Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
    Kun-Fei Yu
    Jun Gu
    Tzonelih Hwang
    Prosanta Gope
    Quantum Information Processing, 2017, 16
  • [44] Everlasting Multi-party Computation
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
  • [45] Covert multi-party computation
    Chandran, Nishanth
    Goyal, Vipul
    Ostrovsky, Rafail
    Sahai, Arnit
    48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
  • [46] Everlasting Multi-party Computation
    Dominique Unruh
    Journal of Cryptology, 2018, 31 : 965 - 1011
  • [47] Everlasting Multi-party Computation
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011
  • [48] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [49] Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
    Yu, Kun-Fei
    Gu, Jun
    Hwang, Tzonelih
    Gope, Prosanta
    QUANTUM INFORMATION PROCESSING, 2017, 16 (08)
  • [50] Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    Damgard, Ivan
    Fitzi, Matthias
    Kiltz, Eike
    Nielsen, Jesper Buus
    Toft, Tomas
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 285 - 304