【24h】

Secret-Sharing for NP

机译:秘密共享NP

获取原文

摘要

A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. [14] put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement x ∈ L for a language L ∈ NP such that anyone holding a witness to the statement can decrypt the message, however, if x not∈ L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP.
机译:一个计算秘密共享方案是,让一个经销商,有一个秘密,分发一套各方之间的这个秘密,使得双方的“合格”的子集,可以有效地重建,而任何一方的“不合格”子秘密的方法不能有效地了解什么秘密。的“合格”的子集的收集是由单调布尔函数定义。这是一个主要的开放问题,了解哪些(单调)功能可以通过计算秘密共享方案来实现。姚建议秘密共享-对于具有多项式大小单调电路(一类是严格大于类的单调函数P中更小)的任何功能的方法。 1990年前后Rudich提出获取秘密共享所有单调功能NP的可能性:为了重构的秘密集合各方必须是“合格”,并提供证人证明了这一事实。近日,Garg等人。 [14]提出的证人加密,这里的目标是相对于声明的x∈升的消息语言L∈加密概念NP,使得任何人都保持证人来声明可以解密该消息,但是,如果x not∈L,那么就很难计算解密。 Garg等人。展示了如何从证人加密构建几个密码原语,给了候选人建设。人们可以证明秘密共享的计算意味着见证加密相同的语言。我们的主要结果是相反的:我们给的NP承担NP和单向函数加密证人任何单调函数的计算秘密共享方案的结构。因此,我们得到秘密共享一个完备性定理:计算秘密共享方案的任何单一单调的NP完全性功能意味着在每NP单调函数的计算秘密共享方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号