Secret Sharing Comparison by Transformation and Rotation

  • Authors:
  • Tord Ingolf Reistad;Tomas Toft

  • Affiliations:
  • Dept. of Telematics, NTNU, Trondheim, Norway N-7491;Dept. of Computer Science, University of Aarhus, Aarhus N, Denmark DK-8200

  • Venue:
  • Information Theoretic Security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Given any linear secret sharing scheme with a multiplication protocol, we show that a given set of players holding shares of two values $a, b \in {\mathbb Z}_{p}$ for some prime p, it is possible to compute a sharing of ρ such that ρ = (a b) with only eight rounds and 29驴 + 36log2(驴) invocations of the multiplication protocol, where 驴 = log(p). The protocol is unconditionally secure against active/adaptive adversaries when the underlying secret sharing scheme has these properties. The proposed protocol is an improvement in the sense that it requires fewer rounds and less invocations of the multiplication protocol than previous solutions.Further, most of the work required is independent of a and b and may be performed in advance in a pre-processing phase before the inputs become available, this is important for practical implementations of multiparty computations, where one can have a set-up phase. Ignoring pre-processing in the analysis, only two rounds and 4驴 invocations of the multiplication protocol are required.