Paper 2019/1280
Fast Secrecy Computation with Multiplication Under the Setting of using Secret Sharing Scheme
Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal
Abstract
In this paper, we describe two new protocols for secure secrecy computation with information theoretical security against the semi-honest adversary and the dishonest majority. Typically, unconditionally secure secrecy computation using the secret sharing scheme is considered impossible under the setting of
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- secrecy computationmultiparty computationsecret sharingn<2k-1information theoretically securefast computation
- Contact author(s)
- ahmad @ sec ee kagu tus ac jp
- History
- 2019-12-06: last of 2 revisions
- 2019-11-05: received
- See all versions
- Short URL
- https://ia.cr/2019/1280
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/1280, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, title = {Fast Secrecy Computation with Multiplication Under the Setting of $k\le N<2k-1$ using Secret Sharing Scheme}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/1280}, year = {2019}, url = {https://eprint.iacr.org/2019/1280} }