{"title":"使用秘密共享方案的安全乘法改进协议","authors":"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa","doi":"10.1016/j.icte.2024.07.009","DOIUrl":null,"url":null,"abstract":"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1019-1025"},"PeriodicalIF":4.1000,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improved protocols for secure multiplication using secret sharing scheme\",\"authors\":\"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa\",\"doi\":\"10.1016/j.icte.2024.07.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>\",\"PeriodicalId\":48526,\"journal\":{\"name\":\"ICT Express\",\"volume\":\"10 5\",\"pages\":\"Pages 1019-1025\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2024-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ICT Express\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2405959524000870\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICT Express","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2405959524000870","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Improved protocols for secure multiplication using secret sharing scheme
Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.
期刊介绍:
The ICT Express journal published by the Korean Institute of Communications and Information Sciences (KICS) is an international, peer-reviewed research publication covering all aspects of information and communication technology. The journal aims to publish research that helps advance the theoretical and practical understanding of ICT convergence, platform technologies, communication networks, and device technologies. The technology advancement in information and communication technology (ICT) sector enables portable devices to be always connected while supporting high data rate, resulting in the recent popularity of smartphones that have a considerable impact in economic and social development.