Secret-Sharing for NP

被引:0
|
作者
Komargodski, Ilan [1 ]
Naor, Moni [1 ]
Yogev, Eylon [1 ]
机构
[1] Weizmann Inst Sci, IL-76100 Rehovot, Israel
关键词
POWER;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. [ 14] put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement x is an element of L for a language L is an element of NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not an element of L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secretsharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP.
引用
收藏
页码:254 / 273
页数:20
相关论文
共 50 条
  • [31] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081
  • [32] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [33] Quantum secret-sharing protocol based on Grover's algorithm
    Hsu, LY
    PHYSICAL REVIEW A, 2003, 68 (02):
  • [34] Asynchronous Error-Decodable Secret-Sharing and Its Application
    Choudhury, Ashish
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 364 - 377
  • [35] Partial islands and subregion complexity in geometric secret-sharing model
    Aranya Bhattacharya
    Arpan Bhattacharyya
    Pratik Nandy
    Ayan K. Patra
    Journal of High Energy Physics, 2021
  • [36] Security of Linear Secret-Sharing Schemes Against Mass Surveillance
    Giacomelli, Irene
    Olimid, Ruxandra F.
    Ranellucci, Samuel
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 43 - 58
  • [37] GAN-Based Key Secret-Sharing Scheme in Blockchain
    Zheng, Wenbo
    Wang, Kunfeng
    Wang, Fei-Yue
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 393 - 404
  • [38] Secret-sharing schemes based on self-dual codes
    Dougherty, Steven T.
    Mesnager, Sihem
    Sole, Patrick
    2008 IEEE INFORMATION THEORY WORKSHOP, 2008, : 338 - +
  • [39] Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
    Beimel, Amos
    Farras, Oriol
    Mintz, Yuval
    Peter, Naty
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 : 394 - 423
  • [40] Efficient multi-party quantum secret-sharing protocol
    Xin, Xiangjun
    He, Fan
    Qiu, Shujing
    Li, Chaoyang
    Li, Fagen
    CHINESE JOURNAL OF PHYSICS, 2024, 92 : 664 - 674