Size-Hiding Computation for Multiple Parties
Kazumasa Shinagawa1,2 Koji Nuida2,3 Takashi Nishide1 Goichiro Hanaoka2 Eiji Okamoto1
1: University of Tsukuba, 2: AIST, 3: JST PRESTO 1
Size-Hiding Computation for Multiple Parties Kazumasa Shinagawa 1,2 - - PowerPoint PPT Presentation
Size-Hiding Computation for Multiple Parties Kazumasa Shinagawa 1,2 Koji Nuida 2,3 Takashi Nishide 1 Goichiro Hanaoka 2 Eiji Okamoto 1 1: University of Tsukuba, 2: AIST, 3: JST PRESTO 1 Secure Multiparty Computation l Each party "
1: University of Tsukuba, 2: AIST, 3: JST PRESTO 1
2
" has some private input π¦"
3
4
5
6
NEW NEW NEW NEW NEW NEW NEW NEW
7
9 can know |π¦"|
0 must not know |π¦(|
1 must not know the output-size
8
9
NEW NEW NEW NEW NEW NEW NEW NEW
10
" sends πΉππ(π¦") to π (
( computes [π§] and broadcast it
11
( cannot send πΉππ(π¦()
0 cannot send πΉππ(π¦0)
1 can know π¦( and π¦0
12
13
NEW NEW NEW NEW NEW NEW NEW NEW
14
15
16
Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π
Β‘ Β‘π Β‘ Β‘π Β‘ Β‘π
Β‘ Β‘π
(:
1 sends to π (:
0 sends to π (:
(, π 0, π 1
17
18
πΊ π¦(,π¦0,π¦1,π¦2
19
20
1, π 2 are not involved in KeyGen
1, π 2 must not join threshold Decryption of π
1, π 2 do Evaluation, and obtain π§ with zero paddings
21
22
(, π0 do KeyGen
2 get encrypted input-shares
2 do Evaluate using MPC
(, π0 do threshold Decryption
(, π 0 are corrupted
1 or π 2 is honest
1, π 2 are corrupted
( or π 0 is honest
23
πΊ π¦(,π¦0,π¦1
24
25
26
27
28