TY - JOUR
T1 - Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation∗
AU - Hiwatashi, Keitaro
AU - Nuida, Koji
N1 - Publisher Copyright:
Copyright © 2024 The Institute of Electronics, Information and Communication Engineers.
PY - 2024/3
Y1 - 2024/3
N2 - Secure two-party computation is a cryptographic tool that enables two parties to compute a function jointly without revealing their inputs. It is known that any function can be realized in the correlated randomness (CR) model, where a trusted dealer distributes input-independent CR to the parties beforehand. Sometimes we can construct more efficient secure two-party protocol for a function g than that for a function f, where g is a restriction of f . However, it is not known in which case we can construct more efficient protocol for domain-restricted function. In this paper, we focus on the size of CR. We prove that we can construct more efficient protocol for a domain-restricted function when there is a “good” structure in CR space of a protocol for the original function, and show a unified way to construct a more efficient protocol in such case. In addition, we show two applications of the above result: The first application shows that some known techniques of reducing CR size for domain-restricted function can be derived in a unified way, and the second application shows that we can construct more efficient protocol than an existing one using our result.
AB - Secure two-party computation is a cryptographic tool that enables two parties to compute a function jointly without revealing their inputs. It is known that any function can be realized in the correlated randomness (CR) model, where a trusted dealer distributes input-independent CR to the parties beforehand. Sometimes we can construct more efficient secure two-party protocol for a function g than that for a function f, where g is a restriction of f . However, it is not known in which case we can construct more efficient protocol for domain-restricted function. In this paper, we focus on the size of CR. We prove that we can construct more efficient protocol for a domain-restricted function when there is a “good” structure in CR space of a protocol for the original function, and show a unified way to construct a more efficient protocol in such case. In addition, we show two applications of the above result: The first application shows that some known techniques of reducing CR size for domain-restricted function can be derived in a unified way, and the second application shows that we can construct more efficient protocol than an existing one using our result.
UR - http://www.scopus.com/inward/record.url?scp=85186672634&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85186672634&partnerID=8YFLogxK
U2 - 10.1587/transfun.2023CIP0023
DO - 10.1587/transfun.2023CIP0023
M3 - Article
AN - SCOPUS:85186672634
SN - 0916-8508
VL - E107.A
SP - 283
EP - 290
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 3
ER -