On the power of nonlinear secret-sharing

被引:18
|
作者
Beimel, A [1 ]
Ishai, Y
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
[2] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[3] AT&T Labs Res, Florham Pk, NJ 07932 USA
[4] DIMACS, Piscataway, NJ USA
关键词
secret-sharing; nonlinear secret-sharing; monotone span programs; quadratic residuosity;
D O I
10.1137/S0895480102412868
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The ( monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : {0, 1} n. {0, 1}. A family of secret-sharing schemes is called efficient if the total length of the n shares is polynomial in n. Most previously known secret-sharing schemes belonged to a class of linear schemes, whose complexity coincides with the monotone span program size of their access structure. Prior to this work there was no evidence that nonlinear schemes can be significantly more efficient than linear schemes, and in particular there were no candidates for schemes efficiently realizing access structures which do not lie in NC. The main contribution of this work is the construction of two efficient nonlinear schemes: ( 1) A scheme with perfect privacy whose access structure is conjectured not to lie in NC, and ( 2) a scheme with statistical privacy whose access structure is conjectured not to lie in P/poly. Another contribution is the study of a class of nonlinear schemes, termed quasi-linear schemes, obtained by composing linear schemes over different fields. While these schemes are (superpolynomially) more powerful than linear schemes, we show that they cannot efficiently realize access structures outside NC.
引用
收藏
页码:258 / 280
页数:23
相关论文
共 50 条
  • [1] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. 16TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2000, : 188 - 202
  • [2] ON SECRET-SHARING MATROIDS
    SEYMOUR, PD
    [J]. JOURNAL OF COMBINATORIAL THEORY SERIES B, 1992, 56 (01) : 69 - 73
  • [3] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 444 - 469
  • [4] Secret-Sharing for NP
    Ilan Komargodski
    Moni Naor
    Eylon Yogev
    [J]. Journal of Cryptology, 2017, 30 : 444 - 469
  • [5] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 254 - 273
  • [6] Genuine secret-sharing states
    Choi, Minjin
    Lee, Soojoon
    [J]. QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [7] Genuine secret-sharing states
    Minjin Choi
    Soojoon Lee
    [J]. Quantum Information Processing, 2021, 20
  • [8] UNIVERSALLY IDEAL SECRET-SHARING SCHEMES
    BEIMEL, A
    CHOR, B
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (03) : 786 - 794
  • [9] Evolving Ramp Secret-Sharing Schemes
    Beimel, Amos
    Othman, Hussien
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 313 - 332
  • [10] The Archistar Secret-Sharing Backup Proxy
    Happe, Andreas
    Wohner, Florian
    Loruenser, Thomas
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,