Fast Multiparty Multiplications from shared bits
نویسندگان
چکیده
We study the question of securely multiplying N -bit integers that are stored in binary representation, in the context of protocols for dishonest majority with preprocessing. We achieve communication complexity O(N) using only secure operations over small fields F2 and Fp with log(p) ≈ log(N). For semi-honest security we achieve communication O(N)2 ∗(N)) using only secure operations over F2. This improves over the straightforward solution of simulating a Boolean multiplication circuit, both asymptotically and in practice.
منابع مشابه
Fast Modular Exponentiation
The well-known binary method computes C = M (mod N) using an average number of 1:5(n 1) multiplications, where n is the number of bits in the binary expansion of E. When the exponent is recoded using the canonical bit recoding technique then the average number of multiplications can be reduced to 1:33(n 1). We show that a further reduction is achieved if the bits of the exponent are scanned at ...
متن کاملLower bounds on communication for multiparty computation
The present report contains a proof of a linear lower bound for a typical three-party secure computation scheme of n independent AND functions. The goal is to prove some linear communication lower bound for a maximally broad definition of «typical». The article [1] contains various communications lower bounds for unconditionally secure multiparty computation. In particular, it contains a linear...
متن کاملAn OCA-based fast algorithm for 2-D discrete periodized wavelet transform
This paper presents a fast algorithm to perform the 2-D discrete periodized wavelet transform based on the operator correlation algorithm (OCA). The OCA-based algorithm needs half of the multiplications and bits required by the classical algorithm. The OCA-based algorithm is modular inherent. It can be easily mapped to VLSI design.
متن کاملA General Framework for Multiparty Computations
Multiparty computation is a computation between multiple players which want to compute a common function based on private input. It was first proposed over 20 years ago and has since matured into a well established science. The goal of this thesis has been to develop efficient protocols for different operations used in multiparty computation and to propose uses for multiparty computation in rea...
متن کاملXMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications
This paper presents xmx, a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses only modular multiplications and xors. The complete scheme can be described by a couple of compact formulae that offer several interesting time-space trade-offs (number of rounds/key-size for constant security). In practice, xmx ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016