A secure multi-party computation protocol without CRS supporting multi-bit encryption

被引:0
|
作者
Zhu, Zong-Wu [1 ]
Huang, Ru-Wei [1 ]
机构
[1] Guangxi Univ, Sch Comp & Elect Informat, Nanning, Peoples R China
来源
PLOS ONE | 2022年 / 17卷 / 03期
关键词
FULLY HOMOMORPHIC ENCRYPTION;
D O I
10.1371/journal.pone.0265572
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
To solve the problems in the existing fully homomorphic encryption (FHE)-based secure multi-party computation (SMC) protocols such as low efficiency, the FHE scheme that supports multi-bit encryption was modified during the generation of the public key so that the users could generate their public keys independently without the common random string (CRS) matrix. Further, a multi-bit Gentry-Sahai-Waters scheme (MGSW) scheme without CRS was constructed. The modified LinkAlgo algorithm was adopted to expand the single-key ciphertext into the multi-key ciphertext and simplify the way of generating the expanded ciphertext. In this way, a multi-key FHE (MFHE) scheme was achieved based on the MGSW scheme. Finally, a three-round SMC protocol without CRS was constructed using the MFHE scheme and the decisional learning with errors (DLWE) assumption, which was secure in the semi-malicious model. Compared to the existing protocols, the protocol proposed herein can support multi-bit encryption and is found with smaller ciphertext size and lower storage overhead and generate the expanded ciphertext in a simpler way. Overall performance is better than existing protocols.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secure Multi-Party Computation Based on Multi-Bit Fully Homomorphic Encryption
    Tang, Chun-Ming
    Hu, Ye-Zhou
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (04): : 836 - 845
  • [2] Secure Multi-Party Computation Protocol Using Asymmetric Encryption
    Shukla, Samiksha
    Sadashivappa, G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 780 - 785
  • [3] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [4] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    [J]. Journal of Cryptology, 2005, 18 : 247 - 287
  • [5] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [6] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [7] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [8] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    [J]. Quantum Information Processing, 2018, 17
  • [9] Secure multi-party computation protocol for sorting problem
    Li, Shundong
    Zhang, Xuanping
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2008, 42 (02): : 231 - 233
  • [10] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662