Additive-to-Multiplicative Conversion
- Additive-to-multiplicative conversion protocols are techniques that transform linear secret shares into multiplicative ones using random multiplication triples and quantum methods.
- They utilize specially-prepared quantum graph states to establish secure correlations among parties while minimizing interactive communication.
- The approach elevates MPC security by ensuring information-theoretic privacy with reduced reliance on trusted dealers and efficient local operations.
Additive-to-multiplicative conversion protocols are foundational primitives for secure multi-party computation (MPC), enabling parties to convert simple linear (additive) secret shares into multiplicative shares that support private evaluation of Boolean conjunctions. The paradigm leverages specially-prepared random triples—multiplication triples—where the correlation (mod 2) is shared among participants, ensuring that private multiplications can be performed without leaking input data. Recent developments show that such primitives can be generated nonclassically via entangled quantum resources, offering new efficiency and security properties.
1. Multiplication Triples and Their Role in Secret-Sharing MPC
In the preprocessing model of information-theoretic MPC, a central functionality is the distribution of a random multiplication triple where . A "dealer" (or preprocessing functionality ) samples uniformly, computes , and distributes additive shares: $[p]_\A,\, [q]_\B,\, [r]_\A,\, [r]_\B,\, [r]_\R$ where $p = [p]_\A$, $q = [q]_\B$, and $r = [r]_\A \oplus [r]_\B \oplus [r]_\R$.
With these resources, two parties (Alice and Bob), holding private inputs , can securely compute an additive sharing of their product :
- Parties broadcast , .
- Locally, each sets (for $X \in \{\A, \B\}$):
so that . Uniformity and secrecy of ensure that the openings reveal nothing about .
2. Generation of Multiplication Triples from Quantum Graph States
Classical triple generation with information-theoretic security typically requires a trusted dealer, secure channels, and interactive protocols. By contrast, a quantum approach constructs these triples using a specially designed tripartite 12-qubit graph state , partitioned among three parties $(\A, \B, \R)$:
- ,
- ,
- ,
- .
Edges are defined such that paths and complete bipartite subgraphs intertwine the parties' qubits, and cross-links inject correlations required for extracting the multiplication triple. The adjacency matrix determines the stabilizer generators: The resource state is prepared as:
3. Measurement-Based Extraction of Additive and Multiplicative Shares
Each party holds a disjoint subset of the 12 qubits. The protocol for extracting shares is a non-interactive sequence of local projective measurements and basis rotations:
- Step 1 (Arm A): $\A$ measures , $\B$ measures , measures ; define . Stabilizer constraints yield .
- Step 2 (Arm B): $\B$ measures , $\A$ measures , measures ; define .
- Step 3 (Tail): measures , $\B$ measures ; set .
- Step 4 (Phase-encoding): $\B$ applies , $\A$ applies .
- Step 5 (Conditional Fork measurements):
- $\B$ measures , with .
- $\A$ measures , .
- measures , with .
- Step 6 (Share assignment):
- $[pq]_\A = m_{10} \oplus m_{11}$,
- $[pq]_\B = m_9$,
- .
Correctness is assured by explicit stabilizer analysis, guaranteeing that $[pq]_\A \oplus [pq]_\B \oplus [pq]_\R = pq$.
4. Security Model and Perfect Privacy
Security holds under an honest-pair assumption: at least two of $\{\A, \B, \R\}$ are honest, while the third party may act maliciously. No classical messages are exchanged during the quantum phase. The protocol's security proof employs a simulation argument: for any attack by the corrupt party , its post-measurement quantum-classical state is independent of , , and , as these are one-time padded by random bits from the honest parties. Any partial measurement outcome remains uniform upon tracing out the pads, yielding statistical privacy.
A simulator , with only the functionality output , can sample an indistinguishable view for the adversary by synthesizing the unique stabilizer state from fresh random bits, thus achieving perfect simulation.
5. Efficiency, Round Complexity, and Resource Assumptions
In the proposed protocol, all quantum operations—measurements and unitary rotations—are local and non-interactive, and the quantum resource can be prepared in advance. The online MPC phase, involving the conversion of shares or computation of function outputs, requires only a single round of broadcast per triple. Resource-wise, one ideal copy of is consumed per multiplication triple; correctness depends upon verified preparation, feasible with current graph-state verification protocols (e.g., McKague ’14, Unnikrishnan ’22).
Classical triple generation demands either a trusted dealer or secure channels and requires at least two rounds of private-channel interaction to achieve comparable information-theoretic security. The quantum approach eliminates these requirements via entanglement and local operation.
6. Higher-Level Constructions: 1-out-of-2 OT and -Party Boolean MPC
The quantum triple-delivery protocol realizes the ideal preprocessing functionality . This enables construction of standard MPC primitives:
- 1-out-of-2 Oblivious Transfer (OT): Two triples are generated for messages and selection bit . Parties broadcast masked versions of their inputs combined with triple shares. Computations using both triples allow only the receiver to recover ; neither sender nor referee learns the selection or transferred message.
- -party Boolean MPC: Any Boolean function with algebraic-normal form can be evaluated using induction over multiplicative shares. To compute a conjunction , share conversion is iterated: the referee opens its share (uniform random bit), this is absorbed by a participant, and the -based pairwise share conversion protocol is applied recursively. Each monomial of degree consumes triples and requires two rounds of broadcast per conjunction. All privacy guarantees reduce to the perfect security of each triple extraction.
This scheme ensures malicious security for any Boolean MPC task, requiring only an honest pair within each triple extraction session.
7. Comparative Summary
| Method | Offline Communication | Assumptions | Security |
|---|---|---|---|
| Classical dealer/triples | Multi-round, interactive | Trusted dealer, private channels | Information-theoretic |
| Quantum graph-state protocol | None (local only) | Entanglement, honest pair | Information-theoretic, perfect |
Quantum entanglement-driven additive-to-multiplicative conversion protocols provide round-optimal, information-theoretically secure MPC primitives under minimal trust assumptions, marking a distinct shift from classical dealer-based approaches. The central trade-off is the reliance on physically verified quantum state distribution, offset by a reduction in communication complexity and setup requirements.