Batch Logical Protocols for Efficient Multi-Party Computation

被引:0
作者
Kiribuchi, Naoto [1 ]
Kato, Ryo [1 ]
Endo, Tsukasa [2 ]
Nishide, Takashi [3 ]
Yoshiura, Hiroshi [1 ]
机构
[1] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
[2] Toshiba Co Ltd, Kawasaki, Kanagawa 2128582, Japan
[3] Kyushu Univ, Fukuoka 8190395, Japan
关键词
multi-party computation; secret sharing; batch logical protocol; secret shared database; BIT-DECOMPOSITION; CONSTANT-ROUNDS; EQUALITY; SECRET;
D O I
10.1587/transfun.E95.A.1718
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is becoming more and more important to make use of personal or classified information while keeping it confidential. A promising tool for meeting this challenge is secure multi-party computation (MPC). It enables multiple parties, each given a snippet of a secret s, to compute a function f(s) by communicating with each other without revealing s. However, one of the biggest problems with MPC is that it requires a vast amount of communication. Much research has gone into making each protocol (equality testing, interval testing, etc.) more efficient. In this work, we make a set of multiple protocols more efficient by transforming them into their equivalent batch processing form and propose two protocols: "Batch Logical OR" and "Batch Logical AND." Using proposed protocols recursively, we also propose "Batch Logical OR-AND" and "Batch Logical AND-OR," and show arbitrary formula consisting of Boolean protocols, OR gates, and AND gates can be batched. Existing logical OR and logical AND protocols consisting of t equality testing invocations have a communication complexity of O(lt), where l is the bit length of the secrets. Our batched versions of these protocols reduce it to O(l+t). For t interval testing invocations, they reduce both communication and round complexity. Thus they can make the queries on a secret shared database more efficient. For example, the use of the proposed protocols reduces the communication complexity for a query consisting of equality testing and interval testing by approximately 70% compared to the use of the corresponding existing protocols. The concept of the proposed protocols is versatile and can be applied to logical formulae consisting of protocols other than equality testing and interval testing, thereby making them more efficient as well.
引用
收藏
页码:1718 / 1728
页数:11
相关论文
共 13 条
[1]  
BEAVER D, 1992, LNCS, V576, P420
[2]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[3]  
Burkhart M., 2010, 19 USENIX SEC S
[4]   Multiparty Computation from El Gamal/Paillier Conversion [J].
Chida, Koji ;
Kikuchi, Hiroaki ;
Hirota, Keiichi ;
Morohashi, Gembu .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) :137-146
[5]  
Cramer R., 2001, Proceedings 21st Annual IACR CRYPTO'01, volume 2139 of LNCS, V2139, P119
[6]  
Cramer R., 2011, SECURE MULTIPARTY CO
[7]  
Damgard I, 2006, LECT NOTES COMPUT SC, V3876, P285
[8]  
Gennaro R., 1998, Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, P101, DOI 10.1145/277697.277716
[9]  
Ning C., 2010, LNCS, V6477, P483
[10]  
Nishide T, 2007, LECT NOTES COMPUT SC, V4450, P343