Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978348
|View full text |Cite
|
Sign up to set email alerts
|

Alternative Implementations of Secure Real Numbers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Along this line of research, [19] proposed in 2013 a similar secure floating-point computation scheme also based on a linear secret sharing framework. In 2016, [20] proposed other techniques for representing secure real numbers suitable for a secret sharing framework with their so-called golden-section and logarithmic number formats.…”
Section: State Of the Artmentioning
confidence: 99%
“…Along this line of research, [19] proposed in 2013 a similar secure floating-point computation scheme also based on a linear secret sharing framework. In 2016, [20] proposed other techniques for representing secure real numbers suitable for a secret sharing framework with their so-called golden-section and logarithmic number formats.…”
Section: State Of the Artmentioning
confidence: 99%
“…Some works embed secure computations on real numbers into finite field operations by representing the real numbers as fixed or floating points numbers. This is for instance the case in the papers Catrina and Saxena (2010); Catrina and Dragulin (2009); Aliasgari et al (2013); Dimitrov et al (2016). One of the main challenges this approach faces is to carry out real number divisions in a secure way as division in a finite field and integer division are completely different.…”
Section: Mpcmentioning
confidence: 99%
“…They perform can perform exponentiation operations in about 164 ms (not amortized), whereas we can perform an exponentiation, with a known public base, in about 2.5 ms (under our 3 parties Shamir based setting). It is worth noting that Dimitrov et al [15] also provided implementations for the exponent function, using alternative ways to represent these rational numbers, using MPC. However, it is difficult to draw direct comparisons with this later work as they target passively secure MPC, whereas we focus on actively secure MPC.…”
Section: Exponentiation and Logarithmsmentioning
confidence: 99%
“…We see that, when Liedel's method can be applied then the performance is better, but the extra cost of our method in dealing with general inputs is only about a factor of two. Discussion: A recent implementation, with regards to the secure evaluation of square root functions on distributed environments, was introduced by Dimitrov et al [15]. These implementations where part of their work on alternative representations for real numbers.…”
mentioning
confidence: 99%