Secret-Sharing for NP

被引:25
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
基金
以色列科学基金会;
关键词
Secret-sharing; Witness encryption; Obfuscation;
D O I
10.1007/s00145-015-9226-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in ). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in : in order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467-476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement for a language such that anyone holding a witness to the statement can decrypt the message; however, if , then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in assuming witness encryption for and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone -complete function implies a computational secret-sharing scheme for every monotone function in .
引用
收藏
页码:444 / 469
页数:26
相关论文
共 50 条
  • [21] Secret-Sharing Schemes for Very Dense Graphs
    Beimel, Amos
    Mintz, Yuval
    Farras, Oriol
    [J]. JOURNAL OF CRYPTOLOGY, 2016, 29 (02) : 336 - 362
  • [22] Multi-linear Secret-Sharing Schemes
    Beimel, Amos
    Ben-Efraim, Aner
    Padro, Carles
    Tyomkin, Ilya
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 394 - 418
  • [23] Secret-Sharing Schemes for Very Dense Graphs
    Amos Beimel
    Oriol Farràs
    Yuval Mintz
    [J]. Journal of Cryptology, 2016, 29 : 336 - 362
  • [24] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [25] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [26] How Secret-sharing can Defeat Terrorist Fraud
    Avoine, Gildas
    Lauradoux, Cedric
    Martin, Benjamin
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 145 - 155
  • [27] Secret-Sharing: Interactions Between a Child, Robot, and Adult
    Bethel, Cindy L.
    Stevenson, Matthew R.
    Scassellati, Brian
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2489 - 2494
  • [28] Secret-Sharing Hardware Improves the Privacy of Network Monitoring
    Wolkerstorfer, Johannes
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 51 - 63
  • [29] Entropic inequalities for a class of quantum secret-sharing states
    Sarvepalli, Pradeep
    [J]. PHYSICAL REVIEW A, 2011, 83 (04):
  • [30] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081