Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Communications of the ACM
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Efficient binary conversion for paillier encrypted values
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Linear, constant-rounds bit-decomposition
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Accelerating multiparty computation by efficient random number bitwise-sharing protocols
WISA'11 Proceedings of the 12th international conference on Information Security Applications
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Batching multiple protocols to improve efficiency of multi-party computation
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
An efficient and probabilistic secure bit-decomposition
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
Bit-decomposition of secret shared values --- securely computing sharings of the binary representation --- is an important primitive in multi-party computation. The problem of performing this task in a constant number of rounds has only recently been solved. This work presents a novel approach at constant-rounds bit-decomposition. The basic idea provides a solution matching the big-$\mathcal{O}$-bound of the original while decreasing the hidden constants. More importantly, further solutions improve asymptotic complexity with only a small increase in constants, reducing it from $\mathcal O(\ell{\rm log}(\ell))$ to $\mathcal O({\ell}{\rm log}^*(\ell))$ and even lower. Like previous solutions, the present one is unconditionally secure against both active and adaptive adversaries.