2014
DOI: 10.1007/978-3-319-13257-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations

Abstract: This paper develops a new hybrid model of floating point numbers suitable for operations in secure multi-party computations. The basic idea is to consider the significand of the floating point number as a fixed point number and implement elementary function applications separately of the significand. This gives the greatest performance gain for the power functions (e.g. inverse and square root), with computation speeds improving up to 18 times in certain configurations. Also other functions (like exponent and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…We have implemented the verification of computations for the Sharemind protocol set [9,37,39,44]. This set covers integer, fix-and floating point operations, as well as shuffling the arrays.…”
Section: Methodsmentioning
confidence: 99%
“…We have implemented the verification of computations for the Sharemind protocol set [9,37,39,44]. This set covers integer, fix-and floating point operations, as well as shuffling the arrays.…”
Section: Methodsmentioning
confidence: 99%
“…For example, once a datum needs to be updated, the data owner needs to randomly separated the datum into n shares, encrypts the shares with the corresponding server's public key/session key, and distributes them to the different servers, respectively. Moreover, the data splitting methods in [10], [11] will increase the storage overhead with the number of the servers, while the ciphertext storage overhead will not be affected in [12], [13], [14]. Furthermore, each secret (symmetry) key is preshared between two servers (n(n − 1)/2 are needed) in order to achieve secure communication, which increases the key management cost.…”
Section: Comprehensive Comparisonmentioning
confidence: 99%
“…In the multiple parties storage strategy, n servers (In [12], [13], [14], three servers are needed) are used to storage data, i.e., each datum is randomly separated into n shares using the secret sharing technique, and the each share is distributed to a server for storage, respectively. However, it brings huge computational cost and communication overhead to the data owner for storing and managing the data, especially for updating and synchronizing the data.…”
Section: Comprehensive Comparisonmentioning
confidence: 99%
See 2 more Smart Citations