Multi-party computation for modular exponentiation based on replicated secret sharing

K Ohara, Y Watanabe, M Iwamoto… - IEICE Transactions on …, 2019 - search.ieice.org
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019search.ieice.org
In recent years, multi-party computation (MPC) frameworks based on replicated secret
sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency
among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy
computations like algebraic operations, as they require a large amount and number of
communication proportional to the number of multiplications in the operations (which is not
the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based …
In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for several heavy computations like algebraic operations, as they require a large amount and number of communication proportional to the number of multiplications in the operations (which is not the case with other secret sharing-based MPCs). In this paper, we propose RSSS-based three-party computation protocols for modular exponentiation, which is one of the most popular algebraic operations, on the case where the base is public and the exponent is private. Our proposed schemes are simple and efficient in both of the asymptotic and practical sense. On the asymptotic efficiency, the proposed schemes require O(n)-bit communication and O(1) rounds,where n is the secret-value size, in the best setting, whereas the previous scheme requires O(n2)-bit communication and O(n) rounds. On the practical efficiency, we show the performance of our protocol by experiments on the scenario for distributed signatures, which is useful for secure key management on the distributed environment (e.g., distributed ledgers). As one of the cases, our implementation performs a modular exponentiation on a 3,072-bit discrete-log group and 256-bit exponent with roughly 300ms, which is an acceptable parameter for 128-bit security, even in the WAN setting.
search.ieice.org
以上显示的是最相近的搜索结果。 查看全部搜索结果