Re: [viff-devel] FW: Bug in ViFF

2008-10-06 Thread Mikkel Krøigård
> Tomas is right, of course. For the passive case, using the first 2t+1 players > always works, and for the active case, we do not use the > local-multiply-and-reshare method anyway. The thing is, I always just assumed that we always used the same set of shares, and it is kind of easy to miss if yo

Re: [viff-devel] FW: Bug in ViFF

2008-10-06 Thread ivan
Hi, Tomas is right, of course. For the passive case, using the first 2t+1 players always works, and for the active case, we do not use the local-multiply-and-reshare method anyway. The current implementation of active security has a preprocessing step based on either PRSS or hyper invertible matri

Re: [viff-devel] FW: Bug in ViFF

2008-10-06 Thread Martin Geisler
Martin Geisler <[EMAIL PROTECTED]> writes: > That would be a good idea, also for performance. I suggest that we use > a round-robin system where we determine the perticipating subset based > on the current program counter. Code for this would look like this: diff --git a/viff/runtime.py b/viff/r

Re: [viff-devel] FW: Bug in ViFF

2008-10-06 Thread Martin Geisler
[EMAIL PROTECTED] writes: > Hi all > > > Today, Sebastiaan and I have been doing some serious thinking and > looking into the VIFF code, and we feel convinced that we've found the > bug. Great work, thanks to both of you for solving the mystery! I guess this bug is sufficiently grave that we shou

Re: [viff-devel] FW: Bug in ViFF

2008-10-06 Thread T . Toft
Hi all Today, Sebastiaan and I have been doing some serious thinking and looking into the VIFF code, and we feel convinced that we've found the bug. The problem lies entirely in the multiplication protocol. In Runtime.mul, products of shares are computed and shared. Then secure Lagrange inte