Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-71677-8_23
|View full text |Cite
|
Sign up to set email alerts
|

Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol

Abstract: Abstract. Damgård et al. [11] showed a novel technique to convert a polynomial sharing of secret a into the sharings of the bits of a in constant rounds, which is called the bit-decomposition protocol. The bit-decomposition protocol is a very powerful tool because it enables bitoriented operations even if shared secrets are given as elements in the field. However, the bit-decomposition protocol is relatively expensive.In this paper, we present a simplified bit-decomposition protocol by analyzing the original … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
188
0

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 184 publications
(190 citation statements)
references
References 23 publications
2
188
0
Order By: Relevance
“…We note that using the ideas in [11], the round complexity of our private exponentiation protocols (as well as our public modulo reduction protocol) can be improved; the method is to use preprocessing, i.e. moving all the generation of (shared) random values (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…We note that using the ideas in [11], the round complexity of our private exponentiation protocols (as well as our public modulo reduction protocol) can be improved; the method is to use preprocessing, i.e. moving all the generation of (shared) random values (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…By the detailed analysis in [11], we get to know that this protocol, denoted as Sec-Prod * (·) in this paper, can be realized in only 3 rounds and 5l multiplications.…”
Section: Known Primitivesmentioning
confidence: 99%
See 3 more Smart Citations