The Cost of IEEE Arithmetic in Secure Computation

被引:2
作者
Archer, David W. [1 ]
Atapoor, Shahla [2 ]
Smart, Nigel P. [2 ,3 ]
机构
[1] Galois Inc, Portland, OR 97204 USA
[2] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
[3] Univ Bristol, Bristol, England
来源
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021 | 2021年 / 12912卷
关键词
MULTIPARTY COMPUTATION; MPC; CIRCUITS;
D O I
10.1007/978-3-030-88238-9_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Programmers are used to the rounding and error properties of IEEE double precision arithmetic, however in secure computing paradigms, such as provided by Multi-Party Computation (MPC), usually a different form of approximation is provided for real number arithmetic. We compare the two standard variants using for LSSS-based MPC, with an implementation of IEEE compliant double precision using binary circuit-based MPC. We compare the relative performance, and conclude that the addition cost of IEEE compliance maybe too great for some applications. Thus in the secure domain standards bodies may wish to examine a different form of real number approximations.
引用
收藏
页码:431 / 452
页数:22
相关论文
共 50 条
  • [41] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [42] Secure floating point arithmetic and private satellite collision analysis
    Kamm, Liina
    Willemson, Jan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (06) : 531 - 548
  • [43] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [44] HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
    Buescher, Niklas
    Demmler, Daniel
    Katzenbeisser, Stefan
    Kretzmer, David
    Schneider, Thomas
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 847 - 861
  • [45] A formal treatment of the role of verified compilers in secure computation
    Bacelar Almeida, Jose Carlos
    Barbosa, Manuel
    Barthe, Gilles
    Pacheco, Hugo
    Pereira, Vitor
    Portela, Bernardo
    [J]. JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 125
  • [46] Compiling Low Depth Circuits for Practical Secure Computation
    Buescher, Niklas
    Holzer, Andreas
    Weber, Alina
    Katzenbeisser, Stefan
    [J]. COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 80 - 98
  • [47] A Comprehensive Survey on Secure Outsourced Computation and Its Applications
    Yang, Yang
    Huang, Xindi
    Liu, Ximeng
    Cheng, Hongju
    Weng, Jian
    Luo, Xiangyang
    Chang, Victor
    [J]. IEEE ACCESS, 2019, 7 : 159426 - 159465
  • [48] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    [J]. Distributed Computing, 2017, 30 : 193 - 229
  • [49] Complete Fairness in Secure Two-Party Computation
    Gordon, S. Dov
    Hazay, Carmit
    Katz, Jonathan
    Lindell, Yehuda
    [J]. JOURNAL OF THE ACM, 2011, 58 (06)
  • [50] Secure computation of common data among malicious partners
    Obermeier, Sebastian
    Boettcher, Stefan
    [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 345 - 354