Secure Equality and Greater-Than Tests with Sublinear Online Complexity
نویسندگان
چکیده
Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for `bit values with O(1) online communication that require O(`) respectively O(κ) total work, where κ is a correctness parameter. Combining these with ideas of Toft [17], we obtain (i) a greater-than protocol with sublinear online complexity in the arithmetic black-box model (O(c) rounds and O(c · `) work online, with c = log ` resulting in logarithmic online work). In difference to Toft, we do not assume two mutually incorruptible parties, but O(`) offline work is required, and (ii) two greater-than protocols with the same online complexity as the above, but with overall complexity reduced to O(log `(κ+ loglog `)) and O(c·`(κ+log `)); these require two mutually incorruptible parties, but are highly competitive with respect to online complexity when compared to existing protocols.
منابع مشابه
New Protocols for Secure Equality Test and Comparison
Protocols for securely comparing private values are among the most fundamental building blocks of multiparty computation. Introduced by Yao under the name millionaire’s problem, they have found numerous applications in a variety of privacy-preserving protocols; however, due to their inherent non-arithmetic structure, existing construction often remain an important bottleneck in large-scale secu...
متن کاملSecure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for secure computation of non-trivial functions, since each party must “touch” every bit of their input lest inform...
متن کاملThe Price of Low Communication in Secure Multi-party Computation
Traditional protocols for secure multi-party computation among n parties communicate at least a linear (in n) number of bits, even when computing very simple functions. In this work we investigate the feasibility of protocols with sublinear communication complexity. Concretely, we consider two clients, one of which may be corrupted, who wish to perform some “small” joint computation using n ser...
متن کاملCommunication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting
We devise multi-party computation protocols for general secure function evaluation with the property that each party is only required to communicate with a small number of dynamically chosen parties. More explicitly, starting with n parties connected via a complete and synchronous network, our protocol requires each party to send messages to (and process messages from) at most polylog(n) other ...
متن کاملOptimal Substring-Equality Queries with Applications to Sparse Text Indexing
We consider the problem of encoding a string of length n from an alphabet [0, σ − 1] so that access and substring-equality queries (that is, determining the equality of any two substrings) can be answered efficiently. A clear lower bound on the size of any prefix-free encoding of this kind is n log σ + Θ(log(nσ)) bits. We describe a new encoding matching this lower bound when σ ≤ nO(1) while su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013