Starting with the seminal work of Beaver (CRYPTO 1991), it is by now a well-known technique to evaluate multiplication gates in an MPC protocol using shared random multiplication triples. The central contribution common to both the presented protocols is a new and simple framework for generating shared random multiplication triples. All the existing protocols approach the problem by first producing shared pairs of random values, followed by computing the shared product of each pair of random values by invoking known protocols for multiplication. Our framework takes a completely different approach and avoids using the multiplication protocols that are typically communication intensive. Namely, we ask the parties to verifiably share random multiplication triples and then securely extract shared random multiplication triples unknown to the adversary. The framework is of independent interest and can be adapted to any honest majority setting.
Category / Keywords: cryptographic protocols / Original Publication (with minor differences): DISC 2013 Date: received 4 Sep 2012, last revised 2 Aug 2013 Contact author: partho31 at gmail com, hirt@inf ethz ch, arpitapatra10@gmail com Available format(s): PDF | BibTeX Citation Version: 20130802:093304 (All versions of this report) Short URL: ia.cr/2012/517 Discussion forum: Show discussion | Start new discussion