conclusion and further improvements.
2 RELATED WORK
Research on multiparty computation (MPC) has
mostly focused on either primitives for multiparty
computations or on some concrete applications such
as actions (Bogetoft et al., 2005; Fischlin, 2001;
Schoenmakers and Tuyls, 2004). This paper consid-
ers neither of these cases. It assumes underlying prim-
itives for multiparty computations with addition and
multiplication of field elements. It also does not con-
sider concrete applications as comparison of elements
are just one piece in a framework for multiparty com-
putations.
Damg˚ard et al. provided the first constant rounds
comparison in the present setting (Damg˚ard et al.,
2006), the protocol relied on bit-decomposition of
values this approach required O (ℓlog(ℓ)) secure mul-
tiplications where ℓ = log(p). Comparison was later
improved by Nishide and Ohta (Nishide and Ohta,
2007) who reduced the complexity to O (ℓ) multipli-
cations.
The most recent solutions have concentrated on a
binary representation of the values being compared.
Thus, unless a radically different approach is taken,
improving on the O (ℓ) bound does not seem feasi-
ble. The present work builds on sub-protocols and
ideas of (Damg˚ard et al., 2006), (Nishide and Ohta,
2007) and (Reistad and Toft, 2007) and aims at re-
ducing the constants hidden under big-O . These costs
hidden under big-O are becoming more relevant as
multiparty is implemented and used in practical ap-
plications (Bogetoft et al., 2008).
Table 1 compares the solution presented in this pa-
per to those of Damg˚ard et al., Nishide and Ohta, and
Reistad and Toft. Type A refers to comparison of ar-
bitrary values [a],[b] ∈ Z
p
, while R is for restricted
values [a],[b] < ⌊
p
4
⌋ and a prime p = 2
ℓ
−c where
c is a small integer; when using Z
p
to simulate in-
teger computation, it is not unreasonable to choose
p in such a way to accommodate these two assump-
tion. Furthermore to give the protocols equal footing
we assume that all protocols use the same underlying
protocols see section 4. E.g. the protocol for creating
random bitwise shared values are created using the
same protocol. For comparison of arbitrary values in
arbitrary fields it is assumed that the underlying pro-
tocol will have to be run two times for a total of 8ℓ
multiplications. For a well chosen p and restricted
values this complexity can be assumed to be close to
2ℓ. As the test becomes more efficient and the prob-
ability of having to run the underlying protocol twice
becomes insignificant.
A distinction is also made between online
complexity and pre-processing complexity. Pre-
processing are all the computations that can be made
independent of the private inputs. Online computa-
tions are all those computations that can only be made
once the private inputs are available.
3 MODEL
We assume a linear secret sharing scheme that allows
for multiparty addition and a multiplication of secret
shared values, to be shared among n > 2 parties. The
security properties of the secret sharing scheme are
inherited, i.e. if the secret sharing scheme is uncon-
ditionally secure against active/adaptive adversaries
then so is the protocols proposed. As as example,
consider Shamir’s scheme along with the protocols of
Ben-Or et al. (or the improved protocols of Gennaro
et al.) (Shamir, 1979; Ben-Or et al., 1988; Gennaro
et al., 1998).
The communication model is that there exist au-
thenticated private channels between each pair of par-
ties. The model assumes that in addition to sharing
values and performing secure arithmetic on Z
p
, the
parties may reveal (reconstruct) shared values. Re-
vealing a secret shared value ensures that the value
becomes known by all parties.
We use [a] to denote a secret sharing of a ∈ Z
p
among the n parties, where p is an ℓ-bit prime (ℓ > 7).
The operators are written using an infix notation. For
shared values [a] and [b], and constant c ∈Z
p
, compu-
tation of sums will be written as [a] + c and [a] + [b],
while products will be written c[a] and [a][b]. The first
three operator are computed locally, while the fourth
operator represents an invocation of the multiplication
protocol.
Sharings of bits, [b] ∈ {0, 1} ⊂ Z
p
will also be
considered. Boolean arithmetic is written using in-
fix notation, though it must be realized using field
arithmetic. Notably xor of two bits is constructed as
[b
1
]⊕[b
2
] = [b
1
]+[b
2
]−2[b
1
][b
2
] which is equivalent.
Values may also be bitwise shared, written [a]
B
.
Rather than having a sharing of a value itself, [a],
sharings of the bits of the binary representation of a
are given, i.e. [a
0
],...,[a
ℓ−1
] ∈{0,1} such that
[a]
B
=
ℓ−1
∑
i=0
2
i
[a
i
] (1)
for ℓ = ⌈log(p)⌉, with the sum being viewed as
occurring over the integers. Note that [a] is easily ob-
tained from [a]
B
as it is a linear combination.
SECRYPT 2009 - International Conference on Security and Cryptography
326