Bit Decomposition Protocols in Secure Multiparty Computation
Title | Bit Decomposition Protocols in Secure Multiparty Computation |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Laud, Peeter, Pankova, Alisa |
Conference Name | Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography |
Publisher | ACM |
ISBN Number | 978-1-4503-5987-0 |
Keywords | compositionality, covert adversary, Cyber physical system, decomposition, Metrics, pubcrawl, secure multiparty computation, verifiable computation |
Abstract | We present improved protocols for the conversion of secret-shared bit-vectors into secret-shared integers and vice versa, for the use as subroutines in secure multiparty computation (SMC) protocols and for protocols verifying the adherence of parties to prescribed SMC protocols. The protocols are primarily designed for three-party computation with honest majority. We evaluate our protocols as part of the Sharemind three-party protocol set and see a general reduction of verification overheads, thereby increasing the practicality of covertly or actively secure Sharemind protocols. |
URL | https://dl.acm.org/doi/10.1145/3267973.3267979 |
DOI | 10.1145/3267973.3267979 |
Citation Key | laud_bit_2018 |