This paper deals with (1) asymptotics of strongly-multiplicative arithmetic secret sharing over an arbitrary xed ring R` := Z/pZ (p > 0 prime, ` > 0 an integer) and supporting an unbounded number of players n, and with (2) its applications to communication complexity of arithmetic MPC over this ring. For each integer r > 0, let R`(r) be the degree-r Galois-ring extension of R`, with maximal ideal p, residue eld (R`(r))/p = Fpr , and |R`(r)| = p. Using the theory of AG-codes over nite elds and over rings, combined with nontrivial algebraic-geometric lifting techniques, we show that, for arbitrary xed ring R` = Z/pZ, there is a xed integer r̂ = r̂(p) > 0 and a (dense) family of R`(r̂)-linear codes C of unbounded length such that: Denoting the reduction of C modulo p (an Fpr̂ -linear code) by C, each of C, (C)⊥ (dual), (C)∗2 ( square under Schur-product ) is asymptotically good. Each of C, C⊥, C∗2 is free over R`(r̂), with the same dimension as its reduction. Therefore, each has the same minimum distance as its reduction. Particularly, each is asymptotically good. All constructions are e cient. This implies arithmetic secret sharing over the xed ring Z/pZ (rather, the constant-degree extension) with unbounded (dense) n, secret-space dimension Ω(n), share-space dimension O(1), t-privacy Ω(n) with t-wise share-uniformity and 1/3 − t/n > 0 a constant arbitrarily close to 0, and, last-but-not-least, multiplicativity-locality n− t. This extends Chen-Cramer (CRYPTO 2006), which only works over any (large enough) nite elds, signi cantly. Concrete parameters we show here are at least as large. We also show a similar lifting result for asymptotically-good reverse multiplication-friendly embeddings (RFME) and we show how to get an asymptoticallygood alternative for the functionality of hyper-invertible matrices (essential for e cient active-security MPC), as the latter are inherently asymptoticallybad. Finally, we give two applications to general arithmetic MPC over Z/pZ (in the BGW-model with active, perfect security) with communication complexity signi cantly better than the obvious approach based on combining MPC over Fp with added circuitry for emulation of the basic Z/pZ-operations over Fp. Concretely, recent results by Cascudo-Cramer-Xing-Yuan on amortized complexity of MPC (CRYPTO 2018) are now achievable over these rings instead of nite elds, with the same asymptotic complexity and adversary rates.
[1]
Matthew K. Franklin,et al.
Communication complexity of secure computation (extended abstract)
,
1992,
STOC '92.
[2]
Judy L. Walker.
Algebraic Geometric Codes over Rings
,
1999
.
[3]
Cynthia Dwork,et al.
Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III
,
2020,
Annual International Cryptology Conference.
[4]
Bart Preneel.
Proceedings of the 19th international conference on Theory and application of cryptographic techniques
,
2000
.
[5]
Salil P. Vadhan,et al.
Theory of Cryptography
,
2016,
Lecture Notes in Computer Science.
[6]
Venkatesan Guruswami,et al.
Linear-time encodable/decodable codes with near-optimal rate
,
2005,
IEEE Transactions on Information Theory.
[7]
Uriel Feige,et al.
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
,
2007,
STOC 2007.
[8]
Ran Canetti,et al.
Advances in Cryptology – CRYPTO 2012
,
2012,
Lecture Notes in Computer Science.
[9]
Luca Wurfel,et al.
Revetements Etales Et Groupe Fondamental Sga 1
,
2016
.
[10]
Eli Biham,et al.
Advances in Cryptology — EUROCRYPT 2003
,
2003,
Lecture Notes in Computer Science.
[11]
Sylvain Duquesne,et al.
Arithmetic of Finite Fields
,
2016,
Lecture Notes in Computer Science.
[12]
Anand Kumar Narayanan,et al.
Nearly linear time encodable codes beating the Gilbert-Varshamov bound
,
2017,
ArXiv.
[13]
Dan Bogdanov,et al.
Sharemind: A Framework for Fast Privacy-Preserving Computations
,
2008,
ESORICS.
[14]
Ignacio Cascudo,et al.
Amortized Complexity of Information-Theoretically Secure MPC Revisited
,
2018,
IACR Cryptol. ePrint Arch..