Netinfo Security ›› 2022, Vol. 22 ›› Issue (12): 16-24.doi: 10.3969/j.issn.1671-1122.2022.12.003

Previous Articles     Next Articles

Research on Proactive Generation Protocol of Beaver Triples

LYU Kewei1,2(), CHEN Chi1,2   

  1. 1. State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing 100093, China
    2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Received:2022-05-06 Online:2022-12-10 Published:2022-12-30
  • Contact: LYU Kewei E-mail:lvkewei@iie.ac.cn

Abstract:

In secure multi-party computation, Beaver triples have been one of basic technique to realize the secure computation of addition and multiplication under secret sharing, which can make the number of protocol rounds reach the polynomial of the number of participating parties. This paper studied secure generation protocol of Beaver triples in the mobile adversary model. First, a computational security, effective two-party active Beaver triple generation protocol was designed based on Paillier public key cryptosystem, whose number of rounds was twice the number of renew operations and sent three ciphertexts of Paillier cryptosystem in each round. Then the effective n-party Beaver triplet initiative generation protocol for information theory security was designed using primary cryptographic tools such as Shamir secret sharing, where n ≥ 3, the total number of elements sent by the protocol was at most 6+6n, and the number of execution rounds is not more than 2κ+2, where к was the number of sharing fragment updates and the number of adversary control participants does not exceed n-2. Finally, protocol design ideas were given for malicious adversary articles.

Key words: secure multi-party computation, Beaver triples, Shamir secret sharing, mobile adversary, proactive secret sharing

CLC Number: