- This repo implements the naive protocol described in "Linear Round Bit-Decomposition of Secret-Shared Values" by Thijs Veugen, in IEEE Transactions on Information Forensics and Security, Vol. 10, No. 3, March 2015.
- It simulates two parties with variables, but I will soon add netcode to facilitate real networking conditions.
- Also I will soon implement the more-efficient protocol described in the paper.
- Two parties securely generate a random number and shares of its bits. This could be accomplished by an addition operation of secret-shared integers, and their bits.
- The parties sum up the secret value to be decomposed, and the random number.
- The parties reveal this sum without revealing anything about the target number.
- the parties securely subtract the random number from the revealed number, bit by bit, producing shares of the target number's bits.
After running the protocol, binary-based operations such as secure comparisson, or division by a power of two, can be computed on the bit shares.