Back to Search Start Over

Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing

Authors :
Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal
Source :
IEEE Access, Vol 11, Pp 51166-51184 (2023)
Publication Year :
2023
Publisher :
IEEE, 2023.

Abstract

Advancements in Internet of Things devices allow for the collection and analysis of big data. Moreover, cloud computing has emerged as an ideal platform for big data analysis because it quickly provides computing resources for analysis at scale. However, concerns exist regarding the privacy and security of this information. Secure computation is a technology that enables computation while maintaining data encryption. In this study, we present a new secure computation based on a client-server model, in which a set of servers perform computations using the inputs of multiple clients. We adopt the $(k, n)$ threshold secret sharing approach, where an input $s$ is divided into $n$ shares and can be recovered from shares with a threshold $k$ . However, conventional secure computation using $(k,n)$ threshold secret sharing generally requires the condition $n \geq 2k-1$ and communication among multiple servers for each multiplication. To the best of our knowledge, no previous study has solved this problem completely. We demonstrate that processes that require communication can be concentrated in the preprocessing phase and propose a secure computation using $(k,n)$ threshold secret sharing that does not require communication during the secure computation phase, even when multiplication is performed. Moreover, we show that the number of communications does not depend on the number of multiplications, unlike in conventional methods. As communication often requires more processing time than the actual secure computation, our method makes it possible to realize faster overall processing than conventional methods. We also present an extensive security analysis and experimental simulation of the proposed method. Our proposed method achieves information-theoretic security against semi-honest adversaries under certain conditions with $n < 2k-1$ .

Details

Language :
English
ISSN :
21693536
Volume :
11
Database :
Directory of Open Access Journals
Journal :
IEEE Access
Publication Type :
Academic Journal
Accession number :
edsdoj.f0a3b082e29457883698642b2a702eb
Document Type :
article
Full Text :
https://doi.org/10.1109/ACCESS.2023.3278995