Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison(<Special Section>Discrete Mathematics and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
We propose constant-round protocols for interval tests, equality tests, and comparisons where shared secret inputs are not given bitwise. In [9]. Damgard et al. presented a novel protocol called the bit-decomposition, which can convert a polynomial sharing of an element in prime field Z_p into sharings of bits. Though, by using the bit-decomposition protocol, those protocols can be constructed with constant round complexities theoretically, it involves expensive computation, leading to relatively high round and communication complexities. In this paper, we construct more efficient protocols for those protocols without relying on the bit-decomposition protocol. In the interval test protocol, checking whether a shared secret exists in the known interval is reduced to checking whether a bitwise-shared random secret exists in the appropriate interval. In the comparison protocol, comparing two shared secrets is reduced to comparing the two secrets via p/2 indirectly where p is an odd prime for an underlying linear secret sharing scheme. In the equality test protocol, checking whether two shared secrets are equal is reduced to checking whether the difference of the two secrets is zero and furthermore checking whether the difference is a zero is reduced to checking quadratice residuosity of a random secret in a probabilistic way.
- 社団法人電子情報通信学会の論文
- 2007-05-01
著者
-
NISHIDE Takashi
Hitachi Software Engineering Co., Ltd.
-
OHTA Kazuo
Graduate School of Electro-Communications, the University of Electro-Communications
-
Nishide Takashi
Hitachi Software Engineering Co. Ltd.
-
Nishide Takashi
Hitachi Software Engineering Co. Ltd.:graduate School Of Electro-communications The University Of El
-
Ohta Kazuo
Graduate School Of Electro-communications The University Of Electro-communications
関連論文
- Attribute-Based Encryption with Partially Hidden Ciphertext Policies
- Attribute-Based Encryption with Partially Hidden Ciphertext Policies
- Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison(Discrete Mathematics and Its Applications)
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares(Discrete Mathematics and Its Applications)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application