使用秘密共享方案的安全乘法改进协议

IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa
{"title":"使用秘密共享方案的安全乘法改进协议","authors":"Ahmad Akmal Aminuddin Mohd Kamal,&nbsp;Masaya Fujisawa","doi":"10.1016/j.icte.2024.07.009","DOIUrl":null,"url":null,"abstract":"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1019-1025"},"PeriodicalIF":4.1000,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improved protocols for secure multiplication using secret sharing scheme\",\"authors\":\"Ahmad Akmal Aminuddin Mohd Kamal,&nbsp;Masaya Fujisawa\",\"doi\":\"10.1016/j.icte.2024.07.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.</div></div>\",\"PeriodicalId\":48526,\"journal\":{\"name\":\"ICT Express\",\"volume\":\"10 5\",\"pages\":\"Pages 1019-1025\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2024-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ICT Express\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2405959524000870\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICT Express","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2405959524000870","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在此,我们提出了一种安全乘法,利用秘密共享解决了 Watanabe 等人提出的安全问题。我们实现了指数运算的特点,即两个具有相同基数(在本例中为基元)的数的乘积只涉及它们的指数相加。与典型的秘密共享方案相比,我们提出的模式需要同时向每个服务器发送两份共享信息,以实现乘法运算,而无需增加服务器数量,从而降低了建立物理服务器的成本。此外,我们还使用香农熵函数来描述所提方法的安全性。最后,我们从计算成本和通信成本的角度对我们提出的方法进行了评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Improved protocols for secure multiplication using secret sharing scheme
Herein, we present a secure multiplication method that uses secret sharing to solve the security problems presented by Watanabe et al. We implemented the characteristics of the exponent operation in which the product of two numbers with the same base (in this case, the primitive element) involves only the addition of their exponents. In contrast to typical secret sharing schemes, our proposed model requires two shares to be sent to each server simultaneously to achieve multiplication without increasing the number of servers required, thereby resulting in a lower cost of establishing a physical server. In addition, Shannon’s entropy function was used to describe the security of the proposed method. Finally, we evaluated our proposed method in terms of computational and communication costs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
ICT Express
ICT Express Multiple-
CiteScore
10.20
自引率
1.90%
发文量
167
审稿时长
35 weeks
期刊介绍: The ICT Express journal published by the Korean Institute of Communications and Information Sciences (KICS) is an international, peer-reviewed research publication covering all aspects of information and communication technology. The journal aims to publish research that helps advance the theoretical and practical understanding of ICT convergence, platform technologies, communication networks, and device technologies. The technology advancement in information and communication technology (ICT) sector enables portable devices to be always connected while supporting high data rate, resulting in the recent popularity of smartphones that have a considerable impact in economic and social development.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信