Shamir-Based HSS for Monomials
- The paper introduces a Shamir-based homomorphic secret sharing scheme for monomials that achieves perfect context-hiding and secure multi-party computation over a prime field.
- The methodology leverages polynomial share generation, local homomorphic evaluation at servers, and Lagrange interpolation for accurate output reconstruction.
- The scheme balances privacy with communication efficiency by meeting parameter constraints, enabling secure evaluation of monomials in MPC frameworks.
Shamir-based homomorphic secret sharing (HSS) for monomials is a secret-sharing scheme that enables secure multi-party computation over a prime field $\F_p$ by distributing shares of individual client inputs among servers. Each server computes a homomorphic evaluation of a monomial function over its received shares, enabling reconstruction of the functional output and achieving a strong privacy guarantee: the output shares reveal no more information about the private inputs than the output value itself. At the heart of this privacy is the context-hiding property, which ensures indistinguishability of output-share distributions for input tuples yielding the same function output.
1. Scheme Definition and Preliminaries
The scheme is instantiated for an arbitrary monomial , specialized from the general Shamir-HSS protocols of Ishai–Lai–Malavolta [ILM21] and Fosli–Ishai–Kolobov–Wootters [FIKW22], as detailed in (Feng et al., 1 Dec 2025). It operates over the field $\F_p$, with denoting the privacy threshold such that up to colluding servers learn nothing about the inputs, and the number of servers, subject to for successful output reconstruction.
Three algorithms define the scheme:
- $\Gen(x_1,\dots,x_n)$: For each client , sample a random Shamir polynomial , $r_{i,u}\in\F_p$. For each server , compute shares .
- $\Eval(j,f,\mathbf{s}_j)$: Server locally computes $y_j = \prod_{i=1}^n (s_{i,j})^{e_i}\in\F_p$.
- $\Rec((y_1,\dots,y_m))$: View , interpolate from using Lagrange interpolation with basis coefficients .
2. Share Generation, Homomorphic Evaluation, and Reconstruction
Input sharing follows the classic Shamir secret sharing paradigm, generating polynomials . Server receives the tuple .
Homomorphic evaluation is performed locally: where has total degree at most , permitting output reconstruction if .
Final reconstruction uses the set : recovering the functional output with perfect completeness.
| Step | Input | Output |
|---|---|---|
| Share Generation | $x_i\in\F_p$ | |
| Homomorphic Eval | ||
| Reconstruction |
3. Context-Hiding Property and Formal Definition
Context-hiding requires that output shares for two distinct input tuples yielding the same function output, , are identically distributed. As formalized (adapted from Definition 4 in (Feng et al., 1 Dec 2025)), perfect context-hiding for means indistinguishability of output-share distributions when the function outputs coincide.
4. Characterization and Proof of Context-Hiding
Rigorous characterization is provided in Theorems 5 and 6 of (Feng et al., 1 Dec 2025):
- For , i.e., on $\F_p$, the scheme is perfectly context-hiding.
- For , restricting inputs to $(\F_p^*)^n$ (i.e., each ), the scheme remains perfectly context-hiding.
The proof utilizes the scaling property: given two input tuples $\mathbf{x}^{(0)},\mathbf{x}^{(1)}\in (\F_p^*)^n$ with equal , there exist scalars $c_i\in\F_p^*$ such that , with . Corresponding Shamir polynomials are set such that , yielding and recursively . Thus, the output-share joint distributions are identical, confirming zero advantage for any distinguisher.
5. Communication Complexity and Trade-offs
The scheme's communication properties are dictated by parameters , , and , as follows:
- Upload (input-share): Each of clients sends one field element to each of the servers, for a total of elements (rate ).
- Download (output-share): Each server sends one field element ( elements total, rate).
- The degree sets the privacy threshold: higher increases polynomial degree, raising minimal as .
Privacy and performance trade-off: to tolerate larger or evaluate higher-degree monomials, must increase, raising communication overhead but preserving information-theoretic security guarantees.
6. Example Instantiation
Consider , , , hence and select . The process is:
- Client $1$:
- Client $2$:
- Server receives , computes
- The combiner calculates
Context-hiding is preserved if input pairs satisfying induce the same distribution of .
7. Significance, Implications, and Extensions
Shamir-based HSS for monomials provides information-theoretic privacy and supports perfect context hiding under suitable parameterizations. Its applicability extends to secure multi-party computation for functions represented as monomials (and more generally polynomials, as discussed in (Feng et al., 1 Dec 2025)). The scheme's rigorous context-hiding guarantee is achieved without rerandomization, thus optimizing share size and communication complexity versus previous techniques.
A plausible implication is the extension to arbitrary polynomials and the broader deployment of such context-hiding HSS approaches in MPC frameworks, leveraging the strict privacy bounds and efficient evaluation characteristic of Shamir-based structures.