BS ISO/IEC 4922-2:2024
$167.15
Information security. Secure multiparty computation – Mechanisms based on secret sharing
Published By | Publication Date | Number of Pages |
BSI | 2024 | 42 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Symbols and abbreviated terms 5 Secure multiparty computation based on secret sharing 5.1 General |
12 | 5.2 Secret sharing 5.3 Secure multiparty computation based on secret sharing |
13 | 6 Addition, subtraction, and multiplication by a constant 6.1 General 6.2 Addition 6.2.1 Addition for the Shamir secret sharing scheme |
14 | 6.2.2 Addition of a constant for the Shamir secret sharing scheme 6.2.3 Addition for the replicated additive secret sharing scheme 6.2.4 Addition of a constant for the replicated additive secret sharing scheme |
15 | 6.3 Subtraction 6.3.1 Subtraction for the Shamir secret sharing scheme 6.3.2 Subtraction of a constant for the Shamir secret sharing scheme |
16 | 6.3.3 Subtraction for the replicated additive secret sharing scheme 6.3.4 Subtraction of a constant for the replicated additive secret sharing scheme |
17 | 6.4 Multiplication by a constant 6.4.1 Multiplication by a constant for the Shamir secret sharing scheme 6.4.2 Multiplication by a constant for the replicated additive secret sharing scheme |
18 | 7 Shared random number generation 7.1 General 7.2 Information-theoretically secure shared random number generation 7.2.1 General-purpose shared random number generation scheme |
19 | 7.2.2 Shared random number generation for the replicated additive secret sharing scheme 7.2.3 Shared random number generation for the Shamir secret sharing scheme |
20 | 7.3 Computationally secure shared random number generation 7.3.1 General |
21 | 7.3.2 Seed sharing phase 7.3.3 Shared random number generation phase for the replicated additive secret sharing scheme |
22 | 7.3.4 Shared random number generation phase for the Shamir secret sharing scheme |
23 | 8 Multiplication 8.1 General 8.2 GRR-multiplication for the Shamir secret sharing scheme 8.2.1 General 8.2.2 Parameters 8.2.3 Multiplication protocol |
24 | 8.2.4 Dot product protocol 8.2.5 Properties 8.3 DN-multiplication for the Shamir secret sharing scheme 8.3.1 General |
25 | 8.3.2 Parameters 8.3.3 Multiplication protocol 8.3.4 Dot product protocol |
26 | 8.3.5 Properties 8.4 CHIKP-multiplication for the replicated additive secret sharing scheme 8.4.1 General 8.4.2 Parameters 8.4.3 Multiplication protocol 8.4.4 Properties |
27 | 8.5 Beaver-multiplication 8.5.1 General 8.5.2 Parameters 8.5.3 Multiplication protocol 8.5.4 Properties |
28 | 9 Secure function evaluation |
29 | Annex A (normative) Object identifiers |
31 | Annex B (informative) Numerical examples |
40 | Annex C (informative) Security considerations |
41 | Bibliography |