Secret-Sharing for NP

被引:0
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, IL-76100 Rehovot, Israel
关键词
POWER;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. [ 14] put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement x is an element of L for a language L is an element of NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not an element of L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secretsharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP.
引用
收藏
页码:254 / 273
页数:20
相关论文
共 50 条
  • [1] Secret-Sharing for NP
    Komargodski, Ilan
    Naor, Moni
    Yogev, Eylon
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (02) : 444 - 469
  • [2] Secret-Sharing for NP
    Ilan Komargodski
    Moni Naor
    Eylon Yogev
    [J]. Journal of Cryptology, 2017, 30 : 444 - 469
  • [3] ON SECRET-SHARING MATROIDS
    SEYMOUR, PD
    [J]. JOURNAL OF COMBINATORIAL THEORY SERIES B, 1992, 56 (01) : 69 - 73
  • [4] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. 16TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2000, : 188 - 202
  • [5] On the power of nonlinear secret-sharing
    Beimel, A
    Ishai, Y
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2005, 19 (01) : 258 - 280
  • [6] Genuine secret-sharing states
    Choi, Minjin
    Lee, Soojoon
    [J]. QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [7] Genuine secret-sharing states
    Minjin Choi
    Soojoon Lee
    [J]. Quantum Information Processing, 2021, 20
  • [8] UNIVERSALLY IDEAL SECRET-SHARING SCHEMES
    BEIMEL, A
    CHOR, B
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (03) : 786 - 794
  • [9] Evolving Ramp Secret-Sharing Schemes
    Beimel, Amos
    Othman, Hussien
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 313 - 332
  • [10] The Archistar Secret-Sharing Backup Proxy
    Happe, Andreas
    Wohner, Florian
    Loruenser, Thomas
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,