Cryptology ePrint Archive: Report 2021/548

Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)

Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal

Abstract: Typically, unconditionally secure computation using a (k,n) threshold secret sharing scheme is considered impossible when n<2k-1. Therefore, in our previous work, we first took the approach of finding the conditions required for secure computation under the setting of n<2k-1 and showed that secure computation using a secret sharing scheme can be realized with a semi-honest adversary under the following three preconditions: (1) the result of secure computation does not include 0; (2) random numbers reconstructed by each server are fixed; and (3) each server holds random numbers unknown to the adversary and holds shares of random numbers that make up the random numbers unknown to the adversary. In this paper, we show that by leaving condition (3), secure computation with information-theoretic security against a semi-honest adversary is possible with k&#8804;n<2k-1. In addition, we clarify the advantage of using secret information that has been encrypted with a random number as input to secure computation. One of the advantages is the acceleration of the computation time. Namely, we divide the computation process into a preprocessing phase and an online phase and shift the cost of communication to the preprocessing phase. Thus, for computations such as inner product operations, we realize a faster online phase, compared with conventional methods.

Category / Keywords: cryptographic protocols / Secure computation, Multiparty computation, Secret sharing, n<2k-1, Information theoretical security, Fast computation

Original Publication (with major differences): 18th International Conference on Security and Cryptography (SECRYPT 2021)

Date: received 24 Apr 2021

Contact author: ahmad at sec ee kagu tus ac jp,iwamura@ee kagu tus ac jp

Available format(s): PDF | BibTeX Citation

Version: 20210427:061115 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]