{"title":"Consideration of the XOR-operation Based Secure Multiparty Computation","authors":"Yuji Suga","doi":"10.1109/IMIS.2015.70","DOIUrl":null,"url":null,"abstract":"Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. And Fujii et al. Independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. Moreover an author extended these schemes and reported existences of (2,2m) threshold secret sharing schemes with small order. This paper attempts to construct secure multiparty computations by using XOR-based secret sharing schemes.","PeriodicalId":144834,"journal":{"name":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2015.70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Fast (k, n)-threshold secret sharing schemes with exclusive-OR operations have proposed by Kurihara et al. And Fujii et al. Independently. Their method are ideal that share size is equal to the size of the data to be distributed with the benefits that can be handled very fast for using only XOR operation at distribution and restoration processes. Moreover an author extended these schemes and reported existences of (2,2m) threshold secret sharing schemes with small order. This paper attempts to construct secure multiparty computations by using XOR-based secret sharing schemes.