【24h】

Secret Sharing and Statistical Zero Knowledge

机译:秘密共享和统计零知识

获取原文

摘要

We show a general connection between various types of statistical zero-knowledge (SZK) proof systems and (unconditionally secure) secret sharing schemes. Viewed through the SZK lens, we obtain several new results on secret-sharing: 1. Characterizations: We obtain an almost-characterization of access structures for which there are secret-sharing schemes with an efficient sharing algorithm (but not necessarily efficient reconstruction). In particular, we show that for every language L ∈ SZK_L (the class of languages that have statistical zero knowledge proofs with log-space verifiers and simulators), a (monotonized) access structure associated with L has such a secret-sharing scheme. Conversely, we show that such secret-sharing schemes can only exist for languages in SZK. 2. Constructions: We show new constructions of secret-sharing schemes with both efficient sharing and efficient reconstruction for access structures associated with languages that are in P, but are not known to be in NC, namely Bounded-Degree Graph Isomorphism and constant-dimensional lattice problems. In particular, this gives us the first combinatorial access structure that is conjectured to be outside NC but has an efficient secret-sharing scheme. Previous such constructions (Beimel and Ishai; CCC 2001) were algebraic and number-theoretic in nature. 3. Limitations: We also show that universally-efficient secret-sharing schemes, where the complexity of computing the shares is a polynomial independent of the complexity of deciding the access structure, cannot exist for all (monotone languages in) P, unless there is a polynomial q such that P {is contained in} DSPACE(q(n)).
机译:我们在各种类型的统计零知识(SZK)证明系统和(无条件安全)秘密共享方案之间显示了一般连接。通过SZK镜头查看,我们在秘密共享上获得了几个新结果:1。表征:我们获得了对访问结构的几乎表征,其中有秘密共享方案具有高效共享算法(但不一定有效的重建)。特别是,我们表明,对于每种语言L∈Szk_L(具有统计零知识的语言类别,与日志空间验证器和模拟器),与L相关联的(单调)访问结构具有这样的秘密共享方案。相反,我们表明此类秘密共享方案只能存在于SZK中的语言。 2.构造:我们展示了与P中的语言相关的有效共享和有效的重建的秘密共享方案的新建筑,但不知道在NC中,即界限度图同构和恒定程度格子问题。特别地,这给了我们所猜测的第一组合访问结构,其在NC之外,但具有有效的秘密共享方案。以前这样的结构(Beimel和Ishai; CCC 2001)是基于代数和性质的性质。 3.限制:我们还表明了普遍有效的秘密共享方案,其中计算股票的复杂性是一种独立于决定访问结构的复杂性的多项式,除非存在,否则不能存在于所有(单调语言)P;多项式q使得p {包含在} dspace(q(n)中)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号