ment techniques for wireless sensor networks).
In this setting, the use of some sort of threshold
cryptography seems promising: instead of relying on
the integrity of every single node, a certain number of
uncompromised nodes is required to produce a valid
result, and no single node knows the entire secret re-
quired to produce this result. The amount of nodes
that have to cooperate in order to create the secret is
equivalent to the number of nodes an attacker has to
successfully compromise before gaining access to the
communication in the network.
Our work now tries to quantify the applicability of
threshold cryptography for wireless sensor networks
in general, with a first focus on multiparty computa-
tions utilizing the Gennaro, Rabin and Rabin (Gen-
naro et al., 1998) protocol, with some numeric opti-
mizations. The remainder of this paper is structured
as follows: Section 2 gives a general introduction to
Multiparty computations and the Gennaro, Rabin and
Rabin protocol. Section 3 then sums up our current
experimental results, while finally Section 4 details
our next steps.
2 MULTIPARTY
COMPUTATIONS
Protocols for multiparty multiplication of two poly-
nomially shared values over Z
q
with a public prime
number q are important cryptographic primitives in
various application fields.
Polynomial sharing refers to the threshold scheme
originally proposed by Shamir (Shamir, 1979), which
assumes that n players share a secret α in a way that
each player P
i
(1 ≤ i ≤ n) owns the function value
f
α
(i) of a polynomial f
α
with degree at most t and
α = f
α
(0). Then any subset of t + 1 participants can
retrieve the secret α (for example by Lagrange’s in-
terpolation formula) but no subset of, at most, t par-
ticipants can do so.
At the beginning of the multiplication protocol
each player P
i
holds as input the function values f
α
(i)
and f
β
(i) of two polynomials f
α
and f
β
with maxi-
mum degree t and α = f
α
(0), β = f
β
(0). At the end
of the protocol each player owns the function value
H(i) of a polynomial H with maximum degree t as
his share of the product αβ = H(0).
Lory (Lory, 2007) and (Lory, 2009) has presented
protocols for this task. They accelerate the technique
of Gennaro, Rabin and Rabin (Gennaro et al., 1998),
which was known for its efficiency among its contem-
porary competitors (see e.g. Cramer and Damg˚ard
(Cramer and Damg˚ard, 2005)). All these protocols
consist of two steps. In a first step, each player P
i
with 1 ≤ i ≤ 2t + 1 computes f
α
(i) f
β
(i) and shares
this value with the other participants using a polyno-
mial h
i
(x) of maximum degree t . He sends player P
j
with 1 ≤ j ≤ n the value h
i
( j) . Here, it is assumed
that the n parties with n ≥ 2t + 1 are connected by
secure point-to-point channels. When used in the en-
vironment of sensor networks, this task could be done
when producing the actual sensor nodes, before de-
ployment into the field.
In a second step, each of these players computes
his share H( j) of αβ by combining the values h
i
( j)
for i = 1, 2, . . . 2t + 1 . The approach is (uncondition-
ally) secure against an adversary, who can corrupt
at most t of the players under the so-called “honest-
but-curious” model. This means that the adversary is
passive and can read the memories of the corrupted
players but not modify their behavior. For details the
reader is referred to the original papers.
The first step of the multiplication protocol of
Gennaro, Rabin and Rabin (Gennaro et al., 1998) re-
quires O(n
2
klogn) bit-operations per player, where k
is the bit size of the prime q and n is the number of
players.
In the correspondingmodified step of (Lory, 2007)
this complexity is reduced to O(n
2
k). The second
step of the protocol in (Gennaro et al., 1998) requires
O(nk
2
) bit-operations per player. The corresponding
step in (Lory, 2009) has a complexity of O(n
2
k) . Of
course, the latter is an improvement only, if the num-
ber of players is considerably smaller than k . This is
true in many cases, because k ≥ 1024 in many prac-
tical situations. All the protocols need one round of
communication (in the first step).
The above complexities are valid under the as-
sumption that all multiplications are performed in
the classical manner, i. e. a multiplication of an l
1
-
bit-integer and an l
2
-bit-integer requires O(l
1
l
2
) bit-
operations. This is realistic, if the bit-lengths are not
too large. For very large numbers, other methods
like the algorithm of Karatsuba, the Toom–Cook al-
gorithm or discrete Fourier transformation based al-
gorithms are faster (see Knuth (Knuth, 1998)). Care-
ful numerical experiments by Wenzl (Wenzl, 2010),
whose implementation was the base for our research,
demonstrate, that also in these cases considerable re-
ductions in computing time can be achieved by the
methods of (Lory, 2007) and (Lory, 2009).
3 PRELIMINARY RESULTS
In our first approach we were interested in two things:
how does the improved protocol scale in comparison
to the unmodified Gennaro, Rabin, and Rabin version
DCNET 2010 - International Conference on Data Communication Networking
126