preserving data aggregation protocols. In smart me-
ter settings, for example, individual measurements are
sent to a data aggregator, responsible for computing
aggregate statistics such as sum or average. Previous
research has shown that these measurements, when
obtained by adversaries in an attack on data confi-
dentiality, can be used to infer patterns revealing cus-
tomer behaviour (Wang and Lu, 2013). To prevent
such eavesdropping attacks from happening, smart
meters are required to encrypt their measurements be-
fore sharing these with the aggregator. However, en-
cryption is not sufficient to prevent malicious aggre-
gators from inferring additional knowledge (Kursawe
et al., 2011). One way to achieve this and protect
against malicious aggregators is by requiring all me-
ters to mask their measurements with random num-
bers. Jointly generating these among all participants
in the protocol ensures they sum to a publicly known
value, thereby guaranteeing the final result’s correct
decryption. Therefore, Joint Random Number Gener-
ation can be considered an important step in privacy-
preserving data aggregation protocols.
Remarkably, most research on privacy-preserving
data aggregation omits how to obtain such numbers
and assumes their existence. For example, Shi et
al. assume that all keys during the setup of the pri-
vate stream aggregation algorithm sum to zero (Shi
et al., 2011; Shi et al., 2015). Lu et al. assume the
same in their homomorphic encryption protocol (Lu
et al., 2017). Moreover, several studies that do fo-
cus on JRNG have high computational and communi-
cation overhead. For example, Erkin and Tsudik as-
sume a fully connected network is available, allowing
each party to exchange random values with all others
(Erkin and Tsudik, 2012). With large networks, this
approach becomes infeasible. A similar approach by
Kursawe et al. uses the notion of leaders, who are re-
quired to compute their random values such that all
values together sum to zero (Kursawe et al., 2011).
This reduces the complexity for all other nodes in the
network since these only communicate with the set
of leaders. However, the complexity of leader nodes
remains the same as in (Erkin and Tsudik, 2012).
This paper presents two novel protocols to per-
form Joint Random Number Generation with minimal
computational and communication overhead. The
first protocol relies on bit-wise sharing of individu-
ally generated random numbers. By doing so, for
each round, the information leaked to an adversary
is minimized to only one bit per participant. The
second protocol uses a single broadcast and is based
on Diffie-Hellman key exchange (Merkle, 1978). We
also present a version of the broadcast-based proto-
col that has reduced complexity. Finally, to compare
all protocols, we conduct an analysis considering both
communication and computation complexity.
Our contributions are two-fold. First, by formaliz-
ing two JRNG protocols explicitly, we provide clarity
on how to efficiently perform Joint Random Number
Generation. In contrast to previous work, our pro-
tocols are stand-alone and not embedded in others.
Therefore, they can be used in any domain or applica-
tion where JRNG is required. Finally, we show how to
perform JRNG with minimal computational and com-
munication overhead, thus improving the way JRNG
is done for the whole research community.
The remainder of this paper is structured as fol-
lows. First, we discuss related work and preliminar-
ies in section 2 and section 3. Next, we discuss the
share-based protocol in section 4, before discussing
the broadcast-based protocol in section 5, along with
its security proof. Finally, discuss complexity in sec-
tion 6 and conclude the paper in section 7.
2 RELATED WORK
Related work on Joint Random Number Generation
(JRNG) can be divided into two categories: research
that focuses on JRNG as a main goal, as does this
one, and research that uses it to achieve a broader
goal, and therefore embeds it in its protocol. First,
we discuss work that embeds JRNG to, for example,
perform privacy-preserving data aggregation: jointly
generated random numbers are used to mask indi-
vidual values before sending them to the aggregator.
When the aggregator sums or multiplies all values,
the masks cancel out and allow the aggregator to ob-
tain the exact result without revealing individual val-
ues. Since in this work, we care about JRNG specif-
ically, we only highlight those procedures and omit
any other details. An example of such research is the
work by Erkin and Tsudik, performing additive ag-
gregation of plaintexts in a setting with at least three
parties (K ≥ 3) (Erkin and Tsudik, 2012). First, par-
ties exchange random numbers in a pair-wise man-
ner, i.e. parties p
i
and p
j
exchange values r
(p
i
→p
j
)
and
r
(p
j
→p
i
)
. Then, each party computes its random value
R
p
i
by summing over the K − 1 received values:
R
p
i
=
K
∑
j=1, j6=i
r
(p
i
→p
j
)
− r
(p
j
→p
i
)
. (1)
It is trivial to see that the addition of these elements
yields zero. While presented in a smart meter set-
ting, this scheme can be used in any setting where
JRNG is required. However, it should be noted that
this work requires the presence of secure communica-
tion channels. The second work is an interactive pro-
tocol proposed by Kursawe, Danezis, and Kohlweiss
Efficient Joint Random Number Generation for Secure Multi-party Computation
437