2019
DOI: 10.1007/978-3-030-12612-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation

Abstract: Recent improvements in the state-of-the-art of MPC for nonfull-threshold access structures introduced the idea of using a collisionresistant hash functions and redundancy in the secret-sharing scheme to construct a communication-efficient MPC protocol which is computationallysecure against malicious adversaries, with abort. The prior work is based on replicated secret-sharing; in this work we extend this methodology to any LSSS implementing a Q2 access structure. To do so we need to establish a folklore proper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 17 publications
(31 citation statements)
references
References 39 publications
0
31
0
Order By: Relevance
“…This uses an offline phase to produce multiplication triples and shared random bits (using Maurer's multiplication protocol [22]) and then an online phase which checks for correctness by using the error detection properties of the underlying Reed-Solomon codes. See [18,27] for precise details of how this protocol works. This arithmetic circuit based MPC protocol is used in our distributed key generation phase, and we make crucial use of the ability of the SCALE-MAMBA system to generate shared random bits in the offline phase; as then our online phase becomes essentially a local operation.…”
Section: Three Party Honest Majority Mpc Using Shamir Secret Sharingmentioning
confidence: 99%
“…This uses an offline phase to produce multiplication triples and shared random bits (using Maurer's multiplication protocol [22]) and then an online phase which checks for correctness by using the error detection properties of the underlying Reed-Solomon codes. See [18,27] for precise details of how this protocol works. This arithmetic circuit based MPC protocol is used in our distributed key generation phase, and we make crucial use of the ability of the SCALE-MAMBA system to generate shared random bits in the offline phase; as then our online phase becomes essentially a local operation.…”
Section: Three Party Honest Majority Mpc Using Shamir Secret Sharingmentioning
confidence: 99%
“…For example in the full-threshold case, one can define an LSSS ⟨•⟩ p and an associated MPC protocol, using the SPDZ [12] system. For general Q2 (actually multiplicative) LSSSs one can utilize the protocol by Smart and Wood [27] to produce an MPC protocol directly using the given LSSS. Whereas using a modified LSSS one can do the same using the protocol given by Chida et al [11].…”
Section: Lsss-based Mpc For Arithmetic Circuitsmentioning
confidence: 99%
“…Whereas using a modified LSSS one can do the same using the protocol given by Chida et al [11]. The difference between the last two protocols is that [27] provides an online phase with lower communication complexity than [11], at the expense of having to utilize a slightly more expensive offline phase.…”
Section: Lsss-based Mpc For Arithmetic Circuitsmentioning
confidence: 99%
See 2 more Smart Citations