ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 論文誌(ジャーナル)
  2. Vol.62
  3. No.9

Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model

https://ipsj.ixsq.nii.ac.jp/records/212852
https://ipsj.ixsq.nii.ac.jp/records/212852
cddaee2d-c111-4256-8b71-41434a715ee1
名前 / ファイル ライセンス アクション
IPSJ-JNL6209003.pdf IPSJ-JNL6209003.pdf (245.1 kB)
Copyright (c) 2021 by the Information Processing Society of Japan
オープンアクセス
Item type Journal(1)
公開日 2021-09-15
タイトル
タイトル Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model
タイトル
言語 en
タイトル Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model
言語
言語 eng
キーワード
主題Scheme Other
主題 [特集:Society 5.0を実現するコンピュータセキュリティ技術] secure multiparty computation, secret sharing, bit-composition protocol, robustness
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者所属
University of Tsukuba/NEC Corporation
著者所属
University of Tsukuba
著者所属(英)
en
University of Tsukuba / NEC Corporation
著者所属(英)
en
University of Tsukuba
著者名 Hikaru, Tsuchida

× Hikaru, Tsuchida

Hikaru, Tsuchida

Search repository
Takashi, Nishide

× Takashi, Nishide

Takashi, Nishide

Search repository
著者名(英) Hikaru, Tsuchida

× Hikaru, Tsuchida

en Hikaru, Tsuchida

Search repository
Takashi, Nishide

× Takashi, Nishide

en Takashi, Nishide

Search repository
論文抄録
内容記述タイプ Other
内容記述 Secure multiparty computation (MPC) enables parties to compute an arbitrary function without revealing each party's inputs. A typical MPC is secret-sharing based MPC (SS-MPC). In the SS-MPC, each party distributes its inputs, and the computation proceeds with secret shares that look exactly like random numbers distributed among the parties. In the SS-MPC protocol, the parties can compute any function represented as a circuit by using shares locally and communicating among the parties. In particular, when the parties compute a complex function composed of binary and arithmetic circuits, an efficient share conversion protocol facilitates the computation of it. An important conversion protocol is a bit-composition protocol that converts a k-dimensional vector with shares on ℤ2k (i.e., shares of binary sequence) to shares on ℤ2 (i.e., shares of decimal value). Previous studies proposed a maliciously secure bit-composition protocol with robustness, which is a security notion that all parties learn the correct output regardless of the attacker's behaviour. However, its security is dependent on a statistical parameter or proved in the random oracle model. In this paper, we propose a novel bit-composition protocol with robustness independent of a statistical parameter by introducing additional clients generating the pair of shares of random values only in the offline phase (which can be performed without the parties' inputs). Our protocol is based on a maliciously secure four-party protocol with one corruption using replicated secret sharing. The security of our protocol is proved in the standard model (which is a weaker assumption than the random oracle model). Our protocol achieves efficiency and the strongest security simultaneously. We also propose a protocol for the Hamming distance with robustness by modifying our bit-composition protocol. It can achieve a secure iris recognition service via MPC with robustness. Furthermore, we extend our protocol with a constant number of parties and clients to one with an arbitrary number of parties and clients.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.29(2021) (online)
DOI http://dx.doi.org/10.2197/ipsjjip.29.515
------------------------------
論文抄録(英)
内容記述タイプ Other
内容記述 Secure multiparty computation (MPC) enables parties to compute an arbitrary function without revealing each party's inputs. A typical MPC is secret-sharing based MPC (SS-MPC). In the SS-MPC, each party distributes its inputs, and the computation proceeds with secret shares that look exactly like random numbers distributed among the parties. In the SS-MPC protocol, the parties can compute any function represented as a circuit by using shares locally and communicating among the parties. In particular, when the parties compute a complex function composed of binary and arithmetic circuits, an efficient share conversion protocol facilitates the computation of it. An important conversion protocol is a bit-composition protocol that converts a k-dimensional vector with shares on ℤ2k (i.e., shares of binary sequence) to shares on ℤ2 (i.e., shares of decimal value). Previous studies proposed a maliciously secure bit-composition protocol with robustness, which is a security notion that all parties learn the correct output regardless of the attacker's behaviour. However, its security is dependent on a statistical parameter or proved in the random oracle model. In this paper, we propose a novel bit-composition protocol with robustness independent of a statistical parameter by introducing additional clients generating the pair of shares of random values only in the offline phase (which can be performed without the parties' inputs). Our protocol is based on a maliciously secure four-party protocol with one corruption using replicated secret sharing. The security of our protocol is proved in the standard model (which is a weaker assumption than the random oracle model). Our protocol achieves efficiency and the strongest security simultaneously. We also propose a protocol for the Hamming distance with robustness by modifying our bit-composition protocol. It can achieve a secure iris recognition service via MPC with robustness. Furthermore, we extend our protocol with a constant number of parties and clients to one with an arbitrary number of parties and clients.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.29(2021) (online)
DOI http://dx.doi.org/10.2197/ipsjjip.29.515
------------------------------
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AN00116647
書誌情報 情報処理学会論文誌

巻 62, 号 9, 発行日 2021-09-15
ISSN
収録物識別子タイプ ISSN
収録物識別子 1882-7764
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 17:21:03.684367
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3