Secure Equality and Greater-Than Tests with Sublinear Online Complexity

نویسندگان

  • Helger Lipmaa
  • Tomas Toft
چکیده

Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for `bit values with O(1) online communication that require O(`) respectively O(κ) total work, where κ is a correctness parameter. Combining these with ideas of Toft [17], we obtain (i) a greater-than protocol with sublinear online complexity in the arithmetic black-box model (O(c) rounds and O(c · `) work online, with c = log ` resulting in logarithmic online work). In difference to Toft, we do not assume two mutually incorruptible parties, but O(`) offline work is required, and (ii) two greater-than protocols with the same online complexity as the above, but with overall complexity reduced to O(log `(κ+ loglog `)) and O(c·`(κ+log `)); these require two mutually incorruptible parties, but are highly competitive with respect to online complexity when compared to existing protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Protocols for Secure Equality Test and Comparison

Protocols for securely comparing private values are among the most fundamental building blocks of multiparty computation. Introduced by Yao under the name millionaire’s problem, they have found numerous applications in a variety of privacy-preserving protocols; however, due to their inherent non-arithmetic structure, existing construction often remain an important bottleneck in large-scale secu...

متن کامل

Secure Computation with Sublinear Amortized Work

Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for secure computation of non-trivial functions, since each party must “touch” every bit of their input lest inform...

متن کامل

The Price of Low Communication in Secure Multi-party Computation

Traditional protocols for secure multi-party computation among n parties communicate at least a linear (in n) number of bits, even when computing very simple functions. In this work we investigate the feasibility of protocols with sublinear communication complexity. Concretely, we consider two clients, one of which may be corrupted, who wish to perform some “small” joint computation using n ser...

متن کامل

Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting

We devise multi-party computation protocols for general secure function evaluation with the property that each party is only required to communicate with a small number of dynamically chosen parties. More explicitly, starting with n parties connected via a complete and synchronous network, our protocol requires each party to send messages to (and process messages from) at most polylog(n) other ...

متن کامل

Optimal Substring-Equality Queries with Applications to Sparse Text Indexing

We consider the problem of encoding a string of length n from an alphabet [0, σ − 1] so that access and substring-equality queries (that is, determining the equality of any two substrings) can be answered efficiently. A clear lower bound on the size of any prefix-free encoding of this kind is n log σ + Θ(log(nσ)) bits. We describe a new encoding matching this lower bound when σ ≤ nO(1) while su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013