Paper 2005/140

How to Split a Shared Secret into Shared Bits in Constant-Round

Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, and Tomas Toft

Abstract

We show that if a set of players hold shares of a value aZp for some prime p (where the set of shares is written [a]p), it is possible to compute, in constant round and with unconditional security, sharings of the bits of a, i.e.~compute sharings [a0]p,,[al1]p such that l=log2(p), a0,,al1{0,1} and a=i=0l1ai2i. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in .

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
secret sharingunconditional security
Contact author(s)
buus @ daimi au dk
History
2005-06-23: last of 2 revisions
2005-05-16: received
See all versions
Short URL
https://ia.cr/2005/140
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/140,
      author = {Ivan Damgård and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft},
      title = {How to Split a Shared Secret into Shared Bits in Constant-Round},
      howpublished = {Cryptology {ePrint} Archive, Paper 2005/140},
      year = {2005},
      url = {https://eprint.iacr.org/2005/140}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.