International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

New Instantiations of the CRYPTO 2017 Masking Schemes

Authors:
Pierre Karpman
Daniel S. Roche
Download:
DOI: 10.1007/978-3-030-03329-3_10
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2018
Abstract: At CRYPTO 2017, Belaïd et al. presented two new private multiplication algorithms over finite fields, to be used in secure masking schemes. To date, these algorithms have the lowest known complexity in terms of bilinear multiplication and random masks respectively, both being linear in the number of shares $$d+1$$ . Yet, a practical drawback of both algorithms is that their safe instantiation relies on finding matrices satisfying certain conditions. In their work, Belaïd et al. only address these up to $$d=2$$ and 3 for the first and second algorithm respectively, limiting so far the practical usefulness of their constructions.In this paper, we use in turn an algebraic, heuristic, and experimental approach to find many more safe instances of Belaïd et al.’s algorithms. This results in explicit instantiations up to order $$d = 6$$ over large fields, and up to $$d = 4$$ over practically relevant fields such as $$\mathbb {F}_{2^8}$$ .
BibTeX
@inproceedings{asiacrypt-2018-29166,
  title={New Instantiations of the CRYPTO 2017 Masking Schemes},
  booktitle={Advances in Cryptology – ASIACRYPT 2018},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={11273},
  pages={285-314},
  doi={10.1007/978-3-030-03329-3_10},
  author={Pierre Karpman and Daniel S. Roche},
  year=2018
}