Secret-Sharing for NP

被引:0
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, IL-76100 Rehovot, Israel
关键词
POWER;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. [ 14] put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement x is an element of L for a language L is an element of NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not an element of L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secretsharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP.
引用
收藏
页码:254 / 273
页数:20
相关论文
共 50 条
  • [41] Upslices, Downslices, and Secret-Sharing with Complexity of 1.5n
    Applebaum, Benny
    Nir, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 627 - 655
  • [42] On constructing 1-cheating immune secret-sharing functions
    Zhang, WeiGuo
    Sun, Xi
    Yang, JunPo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (01) : 30 - 34
  • [43] Share conversion, pseudorandom secret-sharing and applications to secure computation
    Cramer, R
    Damgård, I
    Ishai, Y
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 342 - 362
  • [44] A Rational Secret-Sharing Scheme Based on RSA-OAEP
    Isshiki, Toshiyuki
    Wada, Koichiro
    Tanaka, Keisuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 42 - 49
  • [45] Secret-sharing Based Secure Communication Protocols for Passive RFIDs
    Kapoor, Harsh
    Huang, Dijiang
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5717 - 5722
  • [46] Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    [J]. PHYSICAL REVIEW A, 2007, 76 (06):
  • [47] Nonthreshold quantum secret-sharing schemes in the graph-state formalism
    Sarvepalli, Pradeep
    [J]. PHYSICAL REVIEW A, 2012, 86 (04):
  • [48] Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
    Maji, Hemanta K.
    Paskin-Cherniavsky, Anat
    Suad, Tom
    Wang, Mingyuan
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 779 - 808
  • [49] A key generation algorithm of CPK based on threshold secret-sharing algorithm
    Shao, Chunyu
    Wei, Youguo
    Luo, Shaopeng
    Tang, Xiaokang
    [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 879 - 885
  • [50] A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity
    Tian, Yuan
    Bian, Genqing
    Chang, Jinyong
    Tang, Ying
    Li, Jian
    Ye, Chongqiang
    [J]. ENTROPY, 2023, 25 (05)