On the power of nonlinear secret-sharing

被引:0
|
作者
Beimel, A [1 ]
Ishai, Y [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : {0, 1}(n) - {0, 1}. A family of secret-sharing schemes is called efficient if the total length of the n shares is polynomial in n. Most previously known secret-sharing schemes belonged to a class of linear schemes, whose complexity coincides with the monotone span program size of their access structure. Prior to this work, there was no evidence that nonlinear schemes can be significantly more efficient than linear schemes, and in particular there were no candidates for schemes efficiently realizing access structures which do not lie in NC. The main contribution of this work is the construction of two efficient nonlinear schemes: (1) A scheme with perfect privacy whose access structure is conjectured not to lie in NC; (2) A scheme with statistical privacy whose access structure is conjectured not to lie in P/poly. Another contribution is the study of a class of nonlinear schemes termed quasi-linear schemes, obtained by composing linear schemes over different fields. We show that while these schemes are possibly (super-polynomially) more powerful than linear schemes, they cannot efficiently realize access structures outside NC.
引用
收藏
页码:188 / 202
页数:15
相关论文
共 50 条
  • [21] Secret-Sharing Schemes for Very Dense Graphs
    Beimel, Amos
    Mintz, Yuval
    Farras, Oriol
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 336 - 362
  • [22] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [23] Secret-Sharing Schemes for Very Dense Graphs
    Amos Beimel
    Oriol Farràs
    Yuval Mintz
    [J]. Journal of Cryptology, 2016, 29 : 336 - 362
  • [24] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [25] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [26] How Secret-sharing can Defeat Terrorist Fraud
    Avoine, Gildas
    Lauradoux, Cedric
    Martin, Benjamin
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 145 - 155
  • [27] Secret-Sharing: Interactions Between a Child, Robot, and Adult
    Bethel, Cindy L.
    Stevenson, Matthew R.
    Scassellati, Brian
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2489 - 2494
  • [28] Secret-Sharing Hardware Improves the Privacy of Network Monitoring
    Wolkerstorfer, Johannes
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 51 - 63
  • [29] Entropic inequalities for a class of quantum secret-sharing states
    Sarvepalli, Pradeep
    [J]. PHYSICAL REVIEW A, 2011, 83 (04):
  • [30] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081