Paper 2010/266
Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition
Chao Ning and Qiuliang Xu
Abstract
Bit-decomposition, which is proposed by Damgård \emph{et al.}, is a powerful tool for multi-party computation (MPC). Given a sharing of secret $x$, it allows the parties to compute the sharings of the bits of $x$ in constant rounds. With the help of bit-decomposition, constant-rounds protocols for various MPC problems can be constructed. However, bit-decomposition is relatively expensive, so constructing protocols for MPC problems without relying on bit-decomposition is a meaningful work. In multi-party computation, it remains an open problem whether the \emph{modulo reduction problem} can be solved in constant rounds without bit-decomposition. In this paper, we propose a protocol for (public) modulo reduction without relying on bit-decomposition. This protocol achieves constant round complexity and linear communication complexity. Moreover, we show a generalized bit-decomposition protocol which can, in constant rounds, convert the sharing of secret $x$ into the sharings of the digits of $x$, along with the sharings of the bits of every digit. The digits can be base-\emph{m} for any $m\geq2$. Obviously, when \emph{m} is a power of 2, this generalized protocol is just the original bit-decomposition protocol.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. AsiaCrypt 2010. LNCS, vol 6477, pp. 483-500. Springer, Heidelberg (2010)
- Keywords
- Secure ComputationMultiparty ComputationConstant-RoundsModulo ReductionGeneralization to Bit-Decomposition.
- Contact author(s)
- ncnfl @ 163 com
- History
- 2015-09-23: last of 8 revisions
- 2010-05-11: received
- See all versions
- Short URL
- https://ia.cr/2010/266
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/266, author = {Chao Ning and Qiuliang Xu}, title = {Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/266}, year = {2010}, url = {https://eprint.iacr.org/2010/266} }