Papers
Topics
Authors
Recent
Search
2000 character limit reached

Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes

Published 13 Dec 2008 in cs.CR | (0812.2518v1)

Abstract: Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multiparty computation protocols. However, it remains open whether or not there exist efficient constructions of strongly multiplicative LSSS from general LSSS. In this paper, we propose the new concept of a 3-multiplicative LSSS, and establish its relationship with strongly multiplicative LSSS. More precisely, we show that any 3-multiplicative LSSS is a strongly multiplicative LSSS, but the converse is not true; and that any strongly multiplicative LSSS can be efficiently converted into a 3-multiplicative LSSS. Furthermore, we apply 3-multiplicative LSSS to the computation of unbounded fan-in multiplication, which reduces its round complexity to four (from five of the previous protocol based on strongly multiplicative LSSS). We also give two constructions of 3-multiplicative LSSS from Reed-Muller codes and algebraic geometric codes. We believe that the construction and verification of 3-multiplicative LSSS are easier than those of strongly multiplicative LSSS. This presents a step forward in settling the open problem of efficient constructions of strongly multiplicative LSSS from general LSSS.

Citations (228)

Summary

  • The paper defines 3-multiplicative LSSS and proves its equivalence to strong multiplicativity in certain cases, while providing counterexamples to the converse.
  • It reduces round complexity for unbounded fan-in multiplication from five to four rounds, thereby enhancing the efficiency of secure multiparty computation protocols.
  • The paper demonstrates that 3-multiplicative LSSS simplify construction and verification processes, leveraging constructions based on Reed-Muller and algebraic geometric codes.

Overview of "Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes"

The paper "Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes" presents an expansion on the concepts of Linear Secret Sharing Schemes (LSSS), specifically targeting the enhancement of their capacity to support secure multiparty computation (MPC) protocols. The authors introduce the innovative concept of 3-multiplicative LSSS, which serves as a specialized form of strongly multiplicative LSSS, and analyze its advantages and potential applications.

Key Contributions

  1. Introduction of 3-Multiplicative LSSS: The paper defines a 3-multiplicative LSSS and provides a logical explanation of its equivalence with strongly multiplicative LSSS, affirming that any 3-multiplicative LSSS inherently qualifies as strongly multiplicative. However, the converse – that every strongly multiplicative LSSS is 3-multiplicative – is refuted by a pertinent example provided in the text.
  2. Round Complexity Reduction: A notable numerical finding is the reduction in round complexity for unbounded fan-in multiplication from five to four rounds, achieved with 3-multiplicative LSSS as opposed to strongly multiplicative LSSS. This shows the tangible advantage in utilizing the 3-multiplicative variant for specific computational tasks in MPC.
  3. Simplified Construction and Verification: The study emphasizes that constructing and verifying 3-multiplicative LSSS is more efficient than doing so for strongly multiplicative LSSS. This simplification is validated by the established one-time verification required for 3-multiplicativity, compared to the exhaustive checks needed for strong multiplicativity over all possible adversary sets.
  4. Efficiency in Specific Secret Sharing Schemes: Through constructions based on Reed-Muller codes and algebraic geometric codes, the authors highlight the potential for efficient 3-multiplicative LSSS in certain configurations. These constructions offer a pathway for leveraging existing coding theories to enhance secret sharing mechanisms.

Implications and Future Prospects

From a theoretical perspective, the introduction of 3-multiplicative LSSS provides a more accessible pathway to achieving strong multiplicativity in LSSS. This offers the possibility of developing more resilient and efficient MPC protocols which are vital in securely performing operations over shared data without exposing proprietary or sensitive inputs.

Practically, this research promises a reduction in the computational overhead in executing complex arithmetic operations securely. For organizations and systems that depend heavily on distributed computations and cryptography, the reduced round complexity can lead to time and resource savings, enhancing overall system efficiency.

In terms of future developments, the paper outlines two potential directions for further exploration. First, exploring efficient construction methodologies for 3-multiplicative LSSS could potentially resolve existing open questions regarding the creation of efficient strongly multiplicative constructs from general LSSS. Secondly, understanding the relationship of higher order X-multiplicative models with strongly multiplicative variants could yield fresh insights into constructing even more efficient MPC protocols.

Conclusion

The paper successfully extends the landscape of secure multiparty computation by developing the concept of 3-multiplicative LSSS—a substantial step toward resolving existing challenges in the efficient transformation of general LSSS into strongly multiplicative frameworks. While providing practical benefits such as reduced round complexities and simpler verifications, this research also lays the groundwork for future investigation into efficient secret sharing schemes that balance security considerations with performance efficiency.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.