信息网络安全 ›› 2022, Vol. 22 ›› Issue (12): 16-24.doi: 10.3969/j.issn.1671-1122.2022.12.003

• 技术研究 • 上一篇    下一篇

Beaver三元组主动性生成协议研究

吕克伟1,2(), 陈驰1,2   

  1. 1.中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    2.中国科学院大学网络空间安全学院,北京 100049
  • 收稿日期:2022-05-06 出版日期:2022-12-10 发布日期:2022-12-30
  • 通讯作者: 吕克伟 E-mail:lvkewei@iie.ac.cn
  • 作者简介:吕克伟(1970—),男,山东,副研究员,博士,主要研究方向为理论密码和计算复杂性理论|陈驰(1978—),男,山东,高级工程师,博士,主要研究方向为云计算安全、系统安全
  • 基金资助:
    国家重点研发计划(2017YFB0802500);“十三五”国家密码发展基金(MMJJ20180208)

Research on Proactive Generation Protocol of Beaver Triples

LYU Kewei1,2(), CHEN Chi1,2   

  1. 1. State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2022-05-06 Online:2022-12-10 Published:2022-12-30
  • Contact: LYU Kewei E-mail:lvkewei@iie.ac.cn

摘要:

在安全多方计算中,Beaver三元组是实现加法和乘法有效安全计算的基本技术之一,其可以将协议轮数降低至参与方个数的多项式大小。文章对移动敌手模型下Beaver三元组的安全生成协议开展研究,提出抵御半诚实移动敌手攻击的安全协议。首先,文章利用Paillier公钥系统设计了计算安全的有效两方主动性Beaver三元组生成协议,协议轮数为分享片段更新次数的2倍,每轮通信复杂度为3个Paillier密文;然后利用Shamir秘密分享等初等密码工具设计出信息论安全的有效n方Beaver三元组主动性生成协议,其中n≥3,协议发送元素总数至多为6+6n个,执行轮数不多于2κ+2,其中κ为分享片段更新次数,且敌手控制参与方数不超过n?2。最后,针对恶意敌手文章给出协议设计思路。

关键词: 安全的多方计算, Beaver三元组, Shamir秘密分享, 移动敌手, 主动性秘密分享

Abstract:

In secure multi-party computation, Beaver triples have been one of basic technique to realize the secure computation of addition and multiplication under secret sharing, which can make the number of protocol rounds reach the polynomial of the number of participating parties. This paper studied secure generation protocol of Beaver triples in the mobile adversary model. First, a computational security, effective two-party active Beaver triple generation protocol was designed based on Paillier public key cryptosystem, whose number of rounds was twice the number of renew operations and sent three ciphertexts of Paillier cryptosystem in each round. Then the effective n-party Beaver triplet initiative generation protocol for information theory security was designed using primary cryptographic tools such as Shamir secret sharing, where n ≥ 3, the total number of elements sent by the protocol was at most 6+6n, and the number of execution rounds is not more than 2κ+2, where к was the number of sharing fragment updates and the number of adversary control participants does not exceed n-2. Finally, protocol design ideas were given for malicious adversary articles.

Key words: secure multi-party computation, Beaver triples, Shamir secret sharing, mobile adversary, proactive secret sharing

中图分类号: