首页> 外文期刊>Electronic Colloquium on Computational Complexity >New Protocols for Conditional Disclosure of Secrets (and More)
【24h】

New Protocols for Conditional Disclosure of Secrets (and More)

机译:有条件地披露秘密的新协议(以及更多)

获取原文
           

摘要

We present new protocols for conditional disclosure of secrets (CDS), where two parties want to disclose a secret to a third party if and only if their respective inputs satisfy some predicate.- For general predicates pred : [ N ] [ N ] 0 1 , we present two protocols that achieve o ( N 1 2 ) communication: the first achieves O ( N 1 3 ) communication and the second achieves sub-polynomial 2 O ( log N log log N ) = N o (1) communication.- As a corollary, we obtain improved share complexity for forbidden graph access structures. Namely, for every graph on N vertices, there is a secret-sharing scheme for N parties in which each pair of parties can reconstruct the secret if and only if the corresponding vertices in G are connected, and where each party gets a share of size 2 O ( log N log log N ) = N o (1) .Prior to this work, the best protocols for both primitives required communication complexity O ( N 1 2 ) . Indeed, this is essentially the best that all prior techniques could hope to achieve as they were limited to so-called ``linear reconstruction''. This is the first work to break this O ( N 1 2 ) ``linear reconstruction'' barrier in settings related to secret sharing. To obtain these results, we draw upon techniques for non-linear reconstruction developed in the context of information-theoretic private information retrieval.We further extend our results to the setting of private simultaneous messages (PSM), and provide applications such as an improved attribute-based encryption (ABE) for quadratic polynomials.
机译:我们提出了有条件地公开秘密(CDS)的新协议,其中当且仅当双方各自的输入满足某些谓词时,两方才希望向第三方披露秘密。-对于一般谓词pred:[N] [N] 0 1 ,我们提出了两种实现o(N 1 2)通信的协议:第一种实现O(N 1 3)通信,第二种实现子多项式2 O(log N log log N)= N o(1)通信。因此,对于禁止的图访问结构,我们获得了改进的共享复杂性。也就是说,对于N个顶点上的每个图,都有一个针对N个方的秘密共享方案,其中,当且仅当G中对应的顶点被连接并且每个方获得一定份额的大小时,每对方才可以重建秘密。 2 O(log N log log N)= N o(1)。在此工作之前,两个原语的最佳协议都要求通信复杂度O(N 1 2)。确实,这实际上是所有现有技术都希望达到的最佳效果,因为它们仅限于所谓的``线性重建''。这是在与秘密共享相关的设置中打破O(N 1 2)``线性重构''障碍的第一项工作。为了获得这些结果,我们借鉴了在信息理论私人信息检索的背景下开发的非线性重建技术,并将结果进一步扩展到私人同时发信(PSM)的设置,并提供了诸如改进的属性之类的应用二次多项式的基于ABE的加密(ABE)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号