On the power of nonlinear secret-sharing

被引:0
|
作者
Beimel, A [1 ]
Ishai, Y [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : {0, 1}(n) - {0, 1}. A family of secret-sharing schemes is called efficient if the total length of the n shares is polynomial in n. Most previously known secret-sharing schemes belonged to a class of linear schemes, whose complexity coincides with the monotone span program size of their access structure. Prior to this work, there was no evidence that nonlinear schemes can be significantly more efficient than linear schemes, and in particular there were no candidates for schemes efficiently realizing access structures which do not lie in NC. The main contribution of this work is the construction of two efficient nonlinear schemes: (1) A scheme with perfect privacy whose access structure is conjectured not to lie in NC; (2) A scheme with statistical privacy whose access structure is conjectured not to lie in P/poly. Another contribution is the study of a class of nonlinear schemes termed quasi-linear schemes, obtained by composing linear schemes over different fields. We show that while these schemes are possibly (super-polynomially) more powerful than linear schemes, they cannot efficiently realize access structures outside NC.
引用
收藏
页码:188 / 202
页数:15
相关论文
共 50 条
  • [41] Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n
    Applebaum, Benny
    Nir, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 627 - 655
  • [42] On constructing 1-cheating immune secret-sharing functions
    Zhang, WeiGuo
    Sun, Xi
    Yang, JunPo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (01) : 30 - 34
  • [43] Share conversion, pseudorandom secret-sharing and applications to secure computation
    Cramer, R
    Damgård, I
    Ishai, Y
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 342 - 362
  • [44] A Rational Secret-Sharing Scheme Based on RSA-OAEP
    Isshiki, Toshiyuki
    Wada, Koichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 42 - 49
  • [45] Secret-sharing Based Secure Communication Protocols for Passive RFIDs
    Kapoor, Harsh
    Huang, Dijiang
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5717 - 5722
  • [46] Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    [J]. PHYSICAL REVIEW A, 2007, 76 (06):
  • [47] Nonthreshold quantum secret-sharing schemes in the graph-state formalism
    Sarvepalli, Pradeep
    [J]. PHYSICAL REVIEW A, 2012, 86 (04):
  • [48] Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
    Maji, Hemanta K.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 779 - 808
  • [49] A key generation algorithm of CPK based on threshold secret-sharing algorithm
    Shao, Chunyu
    Wei, Youguo
    Luo, Shaopeng
    Tang, Xiaokang
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 879 - 885
  • [50] A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity
    Tian, Yuan
    Bian, Genqing
    Chang, Jinyong
    Tang, Ying
    Li, Jian
    Ye, Chongqiang
    [J]. ENTROPY, 2023, 25 (05)