Visible to the public Bit Decomposition Protocols in Secure Multiparty Computation

TitleBit Decomposition Protocols in Secure Multiparty Computation
Publication TypeConference Paper
Year of Publication2018
AuthorsLaud, Peeter, Pankova, Alisa
Conference NameProceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
PublisherACM
ISBN Number978-1-4503-5987-0
Keywordscompositionality, covert adversary, Cyber physical system, decomposition, Metrics, pubcrawl, secure multiparty computation, verifiable computation
Abstract

We present improved protocols for the conversion of secret-shared bit-vectors into secret-shared integers and vice versa, for the use as subroutines in secure multiparty computation (SMC) protocols and for protocols verifying the adherence of parties to prescribed SMC protocols. The protocols are primarily designed for three-party computation with honest majority. We evaluate our protocols as part of the Sharemind three-party protocol set and see a general reduction of verification overheads, thereby increasing the practicality of covertly or actively secure Sharemind protocols.

URLhttps://dl.acm.org/doi/10.1145/3267973.3267979
DOI10.1145/3267973.3267979
Citation Keylaud_bit_2018