Passer à la navigation principale Passer à la recherche Passer au contenu principal

Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/ pkZ

  • Mark Abspoel
  • , Ronald Cramer
  • , Ivan Damgård
  • , Daniel Escudero
  • , Matthieu Rambaud
  • , Chaoping Xing
  • , Chen Yuan

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

We study information-theoretic multiparty computation (MPC) protocols over rings Z/ pkZ that have good asymptotic communication complexity for a large number of players. An important ingredient for such protocols is arithmetic secret sharing, i.e., linear secret-sharing schemes with multiplicative properties. The standard way to obtain these over fields is with a family of linear codes C, such that C, C and C2 are asymptotically good (strongly multiplicative). For our purposes here it suffices if the square code C2 is not the whole space, i.e., has codimension at least 1 (multiplicative). Our approach is to lift such a family of codes defined over a finite field F to a Galois ring, which is a local ring that has F as its residue field and that contains Z/ pkZ as a subring, and thus enables arithmetic that is compatible with both structures. Although arbitrary lifts preserve the distance and dual distance of a code, as we demonstrate with a counterexample, the multiplicative property is not preserved. We work around this issue by showing a dedicated lift that preserves self-orthogonality (as well as distance and dual distance), for p≥ 3. Self-orthogonal codes are multiplicative, therefore we can use existing results of asymptotically good self-dual codes over fields to obtain arithmetic secret sharing over Galois rings. For p= 2 we obtain multiplicativity by using existing techniques of secret-sharing using both C and C, incurring a constant overhead. As a result, we obtain asymptotically good arithmetic secret-sharing schemes over Galois rings. With these schemes in hand, we extend existing field-based MPC protocols to obtain MPC over Z/ pkZ, in the setting of a submaximal adversary corrupting less than a fraction 1 / 2 - ε of the players, where ε> 0 is arbitrarily small. We consider 3 different corruption models. For passive and active security with abort, our protocols communicate O(n) bits per multiplication. For full security with guaranteed output delivery we use a preprocessing model and get O(n) bits per multiplication in the online phase and O(nlog n) bits per multiplication in the offline phase. Thus, we obtain true linear bit complexities, without the common assumption that the ring size depends on the number of players.

langue originaleAnglais
titreAdvances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings
rédacteurs en chefShiho Moriai, Huaxiong Wang
EditeurSpringer Science and Business Media Deutschland GmbH
Pages151-180
Nombre de pages30
ISBN (imprimé)9783030648398
Les DOIs
étatPublié - 1 janv. 2020
Evénement26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020 - Daejeon, Corée du Sud
Durée: 7 déc. 202011 déc. 2020

Série de publications

NomLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12493 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférence26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020
Pays/TerritoireCorée du Sud
La villeDaejeon
période7/12/2011/12/20

Empreinte digitale

Examiner les sujets de recherche de « Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/ pkZ ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation