Secret-Sharing for NP

被引:25
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
基金
以色列科学基金会;
关键词
Secret-sharing; Witness encryption; Obfuscation;
D O I
10.1007/s00145-015-9226-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in ). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in : in order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467-476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement for a language such that anyone holding a witness to the statement can decrypt the message; however, if , then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in assuming witness encryption for and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone -complete function implies a computational secret-sharing scheme for every monotone function in .
引用
收藏
页码:444 / 469
页数:26
相关论文
共 50 条
  • [31] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [32] Asynchronous Error-Decodable Secret-Sharing and Its Application
    Choudhury, Ashish
    [J]. INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 364 - 377
  • [33] Quantum secret-sharing protocol based on Grover's algorithm
    Hsu, LY
    [J]. PHYSICAL REVIEW A, 2003, 68 (02):
  • [34] GAN-Based Key Secret-Sharing Scheme in Blockchain
    Zheng, Wenbo
    Wang, Kunfeng
    Wang, Fei-Yue
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 393 - 404
  • [35] Partial islands and subregion complexity in geometric secret-sharing model
    Aranya Bhattacharya
    Arpan Bhattacharyya
    Pratik Nandy
    Ayan K. Patra
    [J]. Journal of High Energy Physics, 2021
  • [36] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [37] Secret-sharing schemes based on self-dual codes
    Dougherty, Steven T.
    Mesnager, Sihem
    Sole, Patrick
    [J]. 2008 IEEE INFORMATION THEORY WORKSHOP, 2008, : 338 - +
  • [38] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [39] Partial islands and subregion complexity in geometric secret-sharing model
    Bhattacharya, Aranya
    Bhattacharyya, Arpan
    Nandy, Pratik
    Patra, Ayan K.
    [J]. JOURNAL OF HIGH ENERGY PHYSICS, 2021, 2021 (12)
  • [40] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (03) : 2083 - 2100