Transferable multiparty computation
First Claim
1. A method of secure multiparty computation, the method comprising:
- selecting a set of first parties from a plurality of first parties for computation;
dividing inputs for the computation associated with each party in the set of first parties into shares to be sent to other parties in the set of first parties;
performing the computation on the shares by the set of first parties using multiparty computation functions selected from a group consisting of;
SHARE, ADD, MULT, RECOMBINE, and combinations thereof;
in response to a trigger event, interrupting the computation on the set of first parties and transferring shares of the set of first parties to a set of second parties selected from a plurality of second parties;
completing the computation by the set of second parties using the transferred shares; and
recombining the transferred shares to reveal an output of the computation.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for secure multiparty computation. A set of first parties is selected from a plurality of first parties for computation. Inputs for computation associated with each party in the set of first parties are divided into shares to be sent to other parties in the set of first parties. The computation on the shares is performed by the set of first parties using multiparty computation functions. In response to a trigger event, shares of the set of first parties are transferred to a set of second parties selected from a plurality of second parties. The computation is completed by the set of second parties using the transferred shares. Finally, the transferred shares are recombined to reveal an output of the computation.
25 Citations
11 Claims
-
1. A method of secure multiparty computation, the method comprising:
-
selecting a set of first parties from a plurality of first parties for computation; dividing inputs for the computation associated with each party in the set of first parties into shares to be sent to other parties in the set of first parties; performing the computation on the shares by the set of first parties using multiparty computation functions selected from a group consisting of;
SHARE, ADD, MULT, RECOMBINE, and combinations thereof;in response to a trigger event, interrupting the computation on the set of first parties and transferring shares of the set of first parties to a set of second parties selected from a plurality of second parties; completing the computation by the set of second parties using the transferred shares; and recombining the transferred shares to reveal an output of the computation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
a first node including; a first processor; a first memory; a first network interface; first program code resident in the first memory and configured to be executed by the first processor, the first program code configured to perform secure multiparty computation, the first program code further configured to receive shares for computation via the network interface and perform the computation on the received shares using multiparty computation functions selected from a group consisting of;
SHARE, ADD, MULT, RECOMBINE, and combinations thereof; andin response to a trigger event, the first program code further configured to interrupt the computation and transfer a share of the received shares by; generating sub shares of a share that is being transferred; sending at least one subshare of the generated subshares to a second node. - View Dependent Claims (10, 11)
Specification