J4

• Original Articles • Previous Articles     Next Articles

Secure distributed generation of the product of shared secrets

WANG Hong(1);XIAO Hong(2);QIU Gang(2);FENG Deng-guo(1)

  

  1. (1) State Key Lab. of Information Security (Graduate School of the Chinese Academy of Sciences), Beijing 100049, China
    (2) State Key Lab. of Integrated Service Networks, Xidian Univ., Xi′an 710071, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-02-20 Published:2006-02-20

Abstract: A new protocol for the task that give two secrets 0, 1 shared among 3 players, compute the product 0 1 but without any exposure about the secrets except the product is presented. It is a two-round protocol if new error occurs. The protocol uses the non-interactive distributed approach for multiplication of the shared secrets and the Welch-Berlekamp decoder for product reconstruction, which results in a more efficient protocol. To achieve provable security, the simulator protocol is given in the security proof.

Key words: secure multiparty computation, distributed cryptography, veriable secret sharing, provable security, robustness

CLC Number: 

  • TN918.1