2006
DOI: 10.1007/11681878_15
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation

Abstract: Abstract. We show that if a set of players hold shares of a value a ∈ Fp for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant rounds and with unconditional security, sharings of the bits of a, i.e., compute sharingsOur protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. The complexity of our protocol is O( log ) invocations of the multiplication protocol for the underlying secret sharing schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
321
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 307 publications
(323 citation statements)
references
References 13 publications
1
321
0
Order By: Relevance
“…For fields of characteristic two, EQZ can be implemented by computing the logical OR of the bit decomposition of a. Generally, a simple protocol requires O( ) invocations in O(log ) rounds, and PreMulC by Damgård et al [8] allows for constant rounds. However, the constant-round version turns out to be slower in our implementation.…”
Section: Building Blocksmentioning
confidence: 99%
See 3 more Smart Citations
“…For fields of characteristic two, EQZ can be implemented by computing the logical OR of the bit decomposition of a. Generally, a simple protocol requires O( ) invocations in O(log ) rounds, and PreMulC by Damgård et al [8] allows for constant rounds. However, the constant-round version turns out to be slower in our implementation.…”
Section: Building Blocksmentioning
confidence: 99%
“…Catrina and de Hoogh [6] presented an implementation that requires O( ) invocations in O(log ) rounds, while Damgård et al [8] showed that a constant-round implementation is feasible. Again, the constant-round implementation is slower in our implementation.…”
Section: Building Blocksmentioning
confidence: 99%
See 2 more Smart Citations
“…While the generic construction is expensive in computation and communication, the result has sparked research activities in secure multiparty computation (SMC), with results that are impressive both performance-wise [9,11,17,20], as well as in the variety of concrete problems that have been tackled [10,14,16,21]. From the start, two kinds of adversaries -passive and active -have been considered in the construction of SMC protocols, with highest performance and the greatest variety achieved for protocol sets secure only against passive adversaries.…”
Section: Introductionmentioning
confidence: 99%