Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Private simultaneous messages based on quadratic residues

Published: 16 August 2023 Publication History

Abstract

Private Simultaneous Messages (PSM) model is a minimal model for secure multiparty computation. Feige, Kilian, and Naor (STOC 1994) and Ishai (Cryptology and Information Security Series 2013) constructed PSM protocols based on quadratic residues. In this paper, we define QR-PSM protocols as a generalization of these protocols. A QR-PSM protocol is a PSM protocol whose decoding function outputs the quadratic residuosity modulo p of what is computed from messages. We design a QR-PSM protocol for any symmetric function f:{0,1}n{0,1} of communication complexity O(n2). As far as we know, it is the most efficient PSM protocol for symmetric functions since the previously known best PSM protocol was of O(n2logn) (Beimel et al., CRYPTO 2014). We also study the sizes of the underlying finite fields Fp in the protocols since the communication complexity of a QR-PSM protocol is proportional to the bit length of the prime p. We show that there is a prime p(1+o(1))N222N-2 such that any length-N pattern of quadratic (non)residues appears modulo p (and hence it can be used for general QR-PSM protocols), which improves the Peralta’s known result (Mathematics of Computation 1992) by a constant factor (1+2)2.

References

[1]
Alon N and Spencer JH The Probabilistic Method 2016 New York Wiley
[2]
Ananchuen W and Caccetta L On the adjacency properties of Paley graphs Networks 1993 23 4 227-236
[3]
Ananchuen W and Caccetta L On tournaments with a prescribed property Ars Combinatoria 1993 36 89-96
[4]
Applebaum B, Holenstein T, Mishra M, and Shayevitz O The communication complexity of private simultaneous messages, revisited J. Cryptol. 2020 33 3 917-953
[5]
Assouline, L., Liu, T.: Multi-party PSM, revisited. In: TCC 2021, pp. 194–223 (2021). Springer
[6]
Baker RC, Harman G, and Pintz J The difference between consecutive primes, II Proc. London Math. Soc. 2001 83 3 532-562
[7]
Ball, M., Holmgren, J., Ishai, Y., Liu, T., Malkin, T.: On the complexity of decomposable randomized encodings, or: how friendly can a garbling-friendly PRF be? In: 11th Innovations in Theoretical Computer Science Conference (ITCS 2020) (2020). Schloss Dagstuhl-Leibniz-Zentrum für Informatik
[8]
Ball, M., Randolph, T.: A note on the complexity of private simultaneous messages with many parties. In: 3rd Conference on Information-Theoretic Cryptography (ITC 2022) (2022). Schloss Dagstuhl-Leibniz-Zentrum für Informatik
[9]
Beimel, A., Gabizon, A., Ishai, Y., Kushilevitz, E., Meldgaard, S., Paskin-Cherniavsky, A.: Non-interactive secure multiparty computation. In: CRYPTO 2014, pp. 387–404 (2014). Springer
[10]
Beimel, A., Ishai, Y., Kumaresan, R., Kushilevitz, E.: On the cryptographic complexity of the worst functions. In: TCC 2014, pp. 317–342 (2014). Springer
[11]
Beimel, A., Kushilevitz, E., Nissim, P.: The complexity of multiparty PSM protocols and related models. In: EUROCRYPT 2018, pp. 287–318 (2018). Springer
[12]
Blass A, Exoo G, and Harary F Paley graphs satisfy all first-order adjacency axioms J. Graph Theory 1981 5 4 435-439
[13]
Bollobás B and Thomason A Graphs which contain all small graphs Eur. J. Combinatorics 1981 2 1 13-15
[14]
Bonato A The search for n-e.c. graphs Contrib. Discret. Math. 2009
[15]
Cameron, P.J.: The random graph. The Mathematics of Paul Erdös II, 333–351 (1997)
[16]
Cleve, R.: Towards optimal simulations of formulas by bounded-width programs. In: Proceedings of the 22nd ACM STOC, pp. 271–277 (1990)
[17]
Costea, A.: Computational and theoretical aspects of n-e.c. graphs. Master’s thesis, Wilfrid Laurier University (2010)
[18]
Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: EUROCRYPT 2003, pp. 596–613 (2003). Springer
[19]
Feige, U., Killian, J., Naor, M.: A minimal model for secure computation. In: Proceedings of the 26th ACM STOC, pp. 554–563 (1994)
[20]
Graham SW and Ringrose CJ Berndt BC, Diamond HG, Halberstam H, and Hildebrand A Lower bounds for least quadratic non-residues Analytic Number Theory 1990 Heidelberg Springer 269-309
[21]
Graham RL and Spencer JH A constructive solution to a tournament problem Can. Math. Bull. 1971 14 1 45-48
[22]
Ishai, Y., Kushilevitz, E.: Private simultaneous messages protocols with applications. In: Proceedings of the 5th Israeli Symposium on Theory of Computing and Systems (ISTCS 1997), pp. 174–183 (1997). IEEE
[23]
Ishai Y Randomization techniques for secure computation Secur. Multi-Party Comput. 2013 10 222
[24]
Montgomery HL Topics in Multiplicative Number Theory 2006 Heidelberg Springer
[25]
Peralta R On the distribution of quadratic residues and nonresidues modulo a prime number Math. Comput. 1992 58 197 433-440
[26]
Satake S On explicit random-like tournaments Graphs Combinatorics 2021 37 4 1451-1463
[27]
Vaikuntanathan, V.: Some open problems in information-theoretic cryptography. In: 37th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2017) (2018). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik
[28]
Yoshida, K., Satake, S., Phoa, F., Sawa, M.: Circulant almost-orthogonal arrays with strength 3 and bandwidth 1: constructions and existence. preprint

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Designs, Codes and Cryptography
Designs, Codes and Cryptography  Volume 91, Issue 12
Dec 2023
318 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 16 August 2023
Accepted: 15 July 2023
Revision received: 19 June 2023
Received: 13 October 2022

Author Tags

  1. Secure multiparty computation
  2. Private simultaneous messages
  3. Quadratic residues
  4. Symmetric functions
  5. Paley graphs

Author Tags

  1. 94A60
  2. 11T71
  3. 14G50
  4. 05C90

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Sep 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media