what can be derived from the public information
(Ben-Or et al., 1988; Hirt, 2001). Conventional
methods of secure multi-party computation using
Shamir’s (𝑘,𝑛) secret sharing scheme perform
addition by locally adding the shares together.
However, this is not so in the case of multiplication.
For example, let secrets 𝑎 and 𝑏 be encoded by
polynomials 𝑓(𝑥) and 𝑔(𝑥) of (𝑘− 1) degree. Note
that the free coefficient of the polynomial ℎ(𝑥) =
𝑓(𝑥)𝑔(𝑥) is 𝑎𝑏. However, the problems of using
ℎ(𝑥) to encode the product of 𝑎 times 𝑏 is that the
degree of ℎ(𝑥) increase from 𝑘−1 to 2𝑘− 2. In
most conventional methods, this poses no problem of
interpolating ℎ(𝑥) from its 𝑛 shares since it is
assumed that parameter 𝑛≥2𝑘−1. Since each
server holds only one share for each secret, this means
that, for each multiplication performed, the number of
servers required will increase from 𝑘 to 2𝑘− 1.
Shingu et al. proposed a solution for
multiplication method called the TUS method
(Shingu et al, 2016). In this method, the secret is first
encrypted with a random number; when performing
multiplication, the encrypted secret is momentarily
restored as a scalar value and multiplication is
realized using the (𝑠𝑐𝑎𝑙𝑎𝑟 𝑣𝑎𝑙𝑢𝑒 × 𝑝𝑜𝑙𝑦𝑛𝑜𝑚𝑖𝑎𝑙)
approach to prevent an increase in the polynomial
degree. However, in the TUS method, there is a
limitation where input with a value of 0 is not allowed
in the protocol.
On the other hand, Watanabe et al. proposed a
solution by taking an approach of differentiating the
relationship between the number of servers required
𝑁 and parameter 𝑛 of Shamir’s (𝑘,𝑛) secret sharing
(Watanabe et al., 2015). In other word, Watanabe et
al. had proposed a method using 𝑁≤𝑘 servers to
realize 𝑛≥2𝑘−1 multiplication. However, this
method still did not solve the problem of increase in
the polynomial degree. Therefore, although the
multiplication was performed using only 𝑁=𝑘
servers, shares required to restore the multiplication
result are 2𝑘− 1 and not 𝑘.
1.2 Our Results
In this study, we focus on solving the problem of
increase in polynomial degree during multiplication.
We propose a new method of multiplication that
could compute 𝑘−1 sharing of multiplication 𝑎𝑏
using only 𝑁=𝑘 servers. The contributions of this
paper can be summarized as follows:
Our Contributions:
─ We propose a new protocol that allows for
multiplication with the setting of 𝑛≥2𝑘−1 to be
performed using only 𝑁=𝑘 servers, and show
that 𝑘−1 sharing of 𝑎𝑏 can be computed by using
only 𝑁=𝑘 servers. (we also include protocols for
addition and scalar multiplication in Appendices 1
and 2)
─ We present a clear security evaluation and show
that our proposed method is secure against semi-
honest adversaries.
─ Finally, we present a clear evaluation of efficiency
of our method. In addition, we also present a
comparison between the methods in (Watanabe et
al., 2015; Shingu et al., 2016).
System Model:
In this paper, we assume a client/server model, where
the clients (e.g. the owner of the secret information
𝑎,𝑏) send shares of their inputs to 𝑛 number of
servers. The servers then carry out the computation
and return the results to them without learning
anything about secret information 𝑎 and 𝑏 . This
model is widely used nowadays and in fact is the
business model used in Cybernetica (Sharemind). In
addition, we assume a semi-honest adversary, where
the adversary follows the protocol specification but
may try to learn more than is allowed by the protocol,
with at most 𝑘 − 1 corrupted servers. We also
assume that secure communication exists between the
client and the servers.
The organization of this paper is as follows. In
Section 2, we present preliminaries. In Section 3, we
explain the related works. In Section 4, we present our
new protocol for multiplication. In Section 5, we
discuss the security of our proposed method of
multiplication. In addition, in Chapter 6, we evaluate
our proposed method. Finally, in Chapter 7, we show
the comparison between our proposed method and
conventional methods.
2 PRELIMINARIES
In this section, we introduce some notations and
known techniques.
2.1 (𝒌,𝒏) Threshold Secret Sharing
Scheme
A secret sharing scheme that satisfies both conditions
stated below is known as (𝑘,𝑛) threshold secret-
sharing scheme.
─ Any 𝑘−1 or fewer number of shares will reveal
nothing about the original secret information 𝑠.