{"title":"基于n < 2k-1秘密共享方案的条件安全多方计算(短文)","authors":"A. Kamal, Keiichi Iwamura","doi":"10.1109/PST.2017.00034","DOIUrl":null,"url":null,"abstract":"Typically, when secrecy multiplication is performed in multiparty computation using Shamir's (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1 This causes a problem where, in order to reconstruct a multiplication result, the number of polynomials needed will increase from k to 2k-1. In this paper, we propose a multiparty computation that uses a secret sharing scheme that is secure against a product-sum operation but does not increase the degree of polynomial of the output. We prove that all combinations of the basic operations (addition, subtraction, multiplication, and division) can be performed securely using this scheme. We also propose three preconditions and finally show that our proposed method is information-theoretic secure against a passive adversary.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper)\",\"authors\":\"A. Kamal, Keiichi Iwamura\",\"doi\":\"10.1109/PST.2017.00034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Typically, when secrecy multiplication is performed in multiparty computation using Shamir's (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1 This causes a problem where, in order to reconstruct a multiplication result, the number of polynomials needed will increase from k to 2k-1. In this paper, we propose a multiparty computation that uses a secret sharing scheme that is secure against a product-sum operation but does not increase the degree of polynomial of the output. We prove that all combinations of the basic operations (addition, subtraction, multiplication, and division) can be performed securely using this scheme. We also propose three preconditions and finally show that our proposed method is information-theoretic secure against a passive adversary.\",\"PeriodicalId\":405887,\"journal\":{\"name\":\"2017 15th Annual Conference on Privacy, Security and Trust (PST)\",\"volume\":\"157 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 15th Annual Conference on Privacy, Security and Trust (PST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PST.2017.00034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PST.2017.00034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper)
Typically, when secrecy multiplication is performed in multiparty computation using Shamir's (k,n) threshold secret sharing scheme, the result is a polynomial with degree of 2k-2 instead of k-1 This causes a problem where, in order to reconstruct a multiplication result, the number of polynomials needed will increase from k to 2k-1. In this paper, we propose a multiparty computation that uses a secret sharing scheme that is secure against a product-sum operation but does not increase the degree of polynomial of the output. We prove that all combinations of the basic operations (addition, subtraction, multiplication, and division) can be performed securely using this scheme. We also propose three preconditions and finally show that our proposed method is information-theoretic secure against a passive adversary.