-
I have two questions:
Line 182 in b8d2d5d
Line 200 in b8d2d5d [L12] Secure Distributed Computation of the Square Root and Applications |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 3 replies
-
You asking these questions at the right time, especially Q2;) For Q1, the answer is yes indeed. However, I would not refer to it as a "bit decomposition approach" because a main benefit is that the use of a bit decomposition is avoided. The result is computed bit-by-bit though, and accumulated in a secure integer. The running time is dominated by the For Q2, we have this paper Divisions and Square Roots with Tight Error Analysis from Newton–Raphson Iteration in Secure Fixed-Point Arithmetic which got published just the other day. It also includes protocols for (integer) square roots, and the plan is to include these in MPyC as well. The paper by Liedel [L12] is also discussed briefly. Approaches using secure floating-point arithmetic like [ABZS12] are usually not performing that well, is my first guess. Overall, we get |
Beta Was this translation helpful? Give feedback.
-
So the bit-by-bit approach uses And the Newton--Raphson approach takes I think the bit-by-bit approach is favorable for small values of Lines 1304 to 1312 in b8d2d5d |
Beta Was this translation helpful? Give feedback.
You asking these questions at the right time, especially Q2;)
For Q1, the answer is yes indeed. However, I would not refer to it as a "bit decomposition approach" because a main benefit is that the use of a bit decomposition is avoided. The result is computed bit-by-bit though, and accumulated in a secure integer. The running time is dominated by the$\ell/2$ secure comparisons, which are executed sequentially. That may be acceptable, if this function isn't evaluated frequently. The approach is well-known, often used as a programming exercise, and for secure computation it is easy to make it oblivious (constant-time).
For Q2, we have this paper Divisions and Square Roots with Tight Error …