TY - JOUR
T1 - Secure addition of floating points
AU - Veugen, Thijs
AU - Wezeman, Robert
AU - Amadori, Alessandro
AU - Bootsma, Sven
AU - Kamphorst, Bart
N1 - Publisher Copyright:
Copyright © 2025 Inderscience Enterprises Ltd.
PY - 2025
Y1 - 2025
N2 - Secure multi-party computation (MPC) and homomorphic encryption are very powerful tools to compute with secret numbers without revealing inputs or any intermediate values. To securely achieve high accuracy with varying number sizes, one needs to work with floating points in the secret (secret-shared or encrypted) domain. The main bottleneck of secure floating points is addition. We improve its efficiency by designing a protocol for multiple additions, using standard building blocks available in most MPC platforms. The more additions n were combined, the larger the relative gain, up to a factor 13 with n = 1,024. Additionally, we introduce a new protocol for securely computing the bitlength (given upper bound M), the first one with linear time complexity and constant round complexity. It reduces secure multiplications with a factor 4 (for the constant-round solution), or the number of communication rounds with a factor M/2 (for the logarithmic-round solution). We evaluate accuracy, execution time and communication complexity of our protocols, and release them open source, such that they can be used to improve the efficiency of secure floating-point arithmetic.
AB - Secure multi-party computation (MPC) and homomorphic encryption are very powerful tools to compute with secret numbers without revealing inputs or any intermediate values. To securely achieve high accuracy with varying number sizes, one needs to work with floating points in the secret (secret-shared or encrypted) domain. The main bottleneck of secure floating points is addition. We improve its efficiency by designing a protocol for multiple additions, using standard building blocks available in most MPC platforms. The more additions n were combined, the larger the relative gain, up to a factor 13 with n = 1,024. Additionally, we introduce a new protocol for securely computing the bitlength (given upper bound M), the first one with linear time complexity and constant round complexity. It reduces secure multiplications with a factor 4 (for the constant-round solution), or the number of communication rounds with a factor M/2 (for the logarithmic-round solution). We evaluate accuracy, execution time and communication complexity of our protocols, and release them open source, such that they can be used to improve the efficiency of secure floating-point arithmetic.
KW - Bit length protocol
KW - Cryptography
KW - Floating-point arithmetic
KW - Homomorphic encryption
KW - Secure multi-party computation
UR - https://www.scopus.com/pages/publications/105002866026
U2 - 10.1504/IJACT.2025.145709
DO - 10.1504/IJACT.2025.145709
M3 - Article
AN - SCOPUS:105002866026
SN - 1753-0563
VL - 5
SP - 1
EP - 11
JO - International journal of applied cryptography
JF - International journal of applied cryptography
IS - 5
ER -