next steps will be to replace the GMP library with
our own code, optimized for constrained devices and
much smaller than the GNU library and finally port-
ing the protocol to a sensor node to get the timings on
real hardware.
In addition, we also plan to perform a more de-
tailed analysis of the algorithm, including several dif-
ferent bitlengths and numbers of players.
ACKNOWLEDGEMENTS
Manuel Koschuch, Matthias Hudler, and Michael
Kr¨uger are supported by the MA27 - EU-Strategie
und Wirtschaftsentwicklung - in the course of
the funding programme “Stiftungsprofessuren und
Kompetenzteams f¨ur die Wiener Fachhochschul-
Ausbildungen”. Peter Lory is supported by the Eu-
ropean Regional Development Fund - Europ¨aischer
Fonds f¨ur regionale Entwicklung (EFRE).
REFERENCES
Algesheimer, J., Camenisch, J., and Shoup, V. (2002). Ef-
ficient computation modulo a shared secret with ap-
plication to the generation of shared safe-prime prod-
ucts. In Yung, M., editor, Advances in Cryptology
– CRYPTO 2002, number 2442 in Lecture Notes in
Computer Science, pages 417–432. Springer Berlin.
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988).
Completeness theorems for non-cryptographic fault-
tolerant distributed computation. In Proceedings of
the 20th Annual Symposium on Theory of Computing
(STOC’88), pages 1–10. ACM Press.
Catalano, D. (2005). Contemporary Cryptology, Advanced
Courses in Mathematics - CRM Barcelona, chapter
Efficient distributed computation modulo a shared se-
cret, pages 1–39. Birkh¨auser, Basel.
Chaum, D., Cr´epeau, C., and Damg˚ard, I. (1988). Mul-
tiparty unconditionally secure protocols. In Proceed-
ings of the 20th Annual Symposium on Theory of Com-
puting (STOC’88), pages 11–19. ACM Press.
Cramer, R. and Damg˚ard, I. (2005). Contemporary Cryp-
tology, Advanced Courses in Mathematics - CRM
Barcelona, chapter Multiparty computation, an intro-
duction, pages 41–87. Birkh¨auser, Basel.
Damg˚ard, I., Fitzi, M., Kiltz, E., Nielsen, J., and Toft,
T. (2006). Unconditionally secure constant-rounds
multi-party computation for equality, comparison, bits
and exponentation. In Proceedings of the 3rd The-
ory of Cryptography Conference (TCC’2006), num-
ber 3876 in Lecture Notes in Computer Science, pages
285–304. Springer Berlin.
Gennaro, R., Rabin, M. O., and Rabin, T. (1998). Simpli-
fied VSS and fast-track multiparty computations with
applications to threshold cryptography. In Proceed-
ings of the 17th ACMSymposium on Principles of Dis-
tributed Computing (PODC’98).
Goldreich, O., Micali, S., and Wigderson, A. (1987). How
to play any mental game. In Proceedings of the
19th Annual Symposium on Theory of Computing
(STOC’87), pages 218–229. ACM Press.
Koschuch, M., Hudler, M., Kr¨uger, M., Lory, P., and Wenzl,
J. (2010). Applicability of multiparty computation
schemes for wireless sensor networks - position pa-
per. In Sevillano, J. L., Obaidat, M. S., and Nicopoli-
tidis, P., editors, DCNET 2010 - International Confer-
ence on Data Communication Networking - Proceed-
ings of DCNET and OPTICS 2010, pages 125–128.
SciTePress - Science and Technology Publications.
Lory, P. (2007). Reducing the complexity in the distributed
multiplication protocol of two polynomially shared
values. In Proceedings of the 21st International Con-
ference on Advanced Information Networking and Ap-
plications (AINA’2007), volume 1, pages 404–408.
IEEE Computer Society.
Lory, P. (2009). Secure distributed multiplication of two
polynomially shared values: Enhancing the efficiency
of the protocol. In Proceedings of the Third Inter-
national Conference on Emerging Security Informa-
tion, Systems and Technologies (SECURWARE 2009),
pages 486–491. IEEE Computer Society.
Merwe, J. V. D., Dawoud, D., and McDonald, S. (2007).
A survey on peer-to-peer key management for mobile
ad hoc networks. ACM Computing Surveys (CSUR),
39(1):1–45.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Yao, A. C. (1986). How to generate and exchange secrets.
In Proceedings of the 27th IEEE Symposium on Foun-
dations of Computer Science (FOCS’86), pages 162–
167. IEEE Computer Society.
DCNET 2011 - International Conference on Data Communication Networking
78