Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (short paper)

被引:7
|
作者
Kamal, Ahmad Akmal Aminuddin Mohd [1 ]
Iwamura, Keiichi [1 ]
机构
[1] Tokyo Univ Sci, Dept Elect Engn, Katsushika Ku, 6-3-1 Niijuku, Tokyo, Japan
关键词
conditionally secure; multiparty computation; MPC; secret sharing scheme; secure computation; product-sum operation; n < 2k-1;
D O I
10.1109/PST.2017.00034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Typically, when secrecy multiplication is performed in multiparty computation using Shamir's (k, n) threshold secret sharing scheme, the result is a polynomial with degree of 2k - 2 instead of k-1. This causes a problem where, in order to reconstruct a multiplication result, the number of polynomials needed will increase from k to 2k 1. In this paper, we propose a multiparty computation that uses a secret sharing scheme that is secure against a product-sum operation but does not increase the degree of polynomial of the output. We prove that all combinations of the basic operations (addition, subtraction, multiplication, and division) can be performed securely using this scheme. We also propose three preconditions and finally show that our proposed method is information-theoretic secure against a passive adversary.
引用
收藏
页码:225 / 230
页数:6
相关论文
共 21 条
  • [1] Fast Secure Computation Based on a Secret Sharing Scheme for n &lt; 2k-1
    Tokita, Kyohei
    Iwamura, Keiichi
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [2] A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme
    Praveen, K.
    Sasi, Nithin
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 457 - 463
  • [3] Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation
    Olalia, Romulo L., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 209 - 219
  • [4] Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters
    Zhu, Lei
    Liu, Yanxiao
    Wang, Yichuan
    Ji, Wenjiang
    Hei, Xinhong
    Yao, Quanzhu
    Zhu, Xiaoyan
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 1 - 4
  • [5] Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing
    Falamas, Diana-Elena
    Marton, Kinga
    Suciu, Alin
    SYMMETRY-BASEL, 2021, 13 (05):
  • [6] Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2023, 11 : 51166 - 51184
  • [7] Secure (n, n+1)-Multi Secret Image Sharing Scheme using Additive Modulo
    Rajput, Mohit
    Deshmukh, Maroti
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 677 - 683
  • [8] TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2022, 10 : 120503 - 120513
  • [9] TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE Access, 2022, 10 : 120503 - 120513
  • [10] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004