Paper 2014/611
Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation
Shlomi Dolev, Niv Gilboa, and Ximing Li
Abstract
Information theoretically secure multi-party computation implies severe communication overhead among the computing participants, as there is a need to reduce the polynomial degree after each multiplication. In particular, when the input is (practically) unbounded, the number of multiplications and therefore the communication bandwidth among the participants may be practically unbounded. In some scenarios the communication among the participants should better be avoided altogether, avoiding linkage among the secret share holders. For example, when processes in clouds operate over streaming secret shares without communicating with each other, they can actually hide their linkage and activity in the crowd. An adversary that is able to compromise processes in the cloud may need to capture and analyze a very large number of possible shares.
Consider a dealer that wants to repeatedly compute functions on a long file with the assistance of
Note: minor change in tile
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- Preprint. MINOR revision.
- Keywords
- Secret sharingAutomataTheoretically secureMulti-Party ComputationCommunicationless clouds
- Contact author(s)
- liximing cn @ gmail com
- History
- 2014-08-14: revised
- 2014-08-13: received
- See all versions
- Short URL
- https://ia.cr/2014/611
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/611, author = {Shlomi Dolev and Niv Gilboa and Ximing Li}, title = {Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/611}, year = {2014}, url = {https://eprint.iacr.org/2014/611} }