首页> 外文期刊>IEEE Journal on Selected Areas in Communications >Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure
【24h】

Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure

机译:Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure

获取原文
获取原文并翻译 | 示例
       

摘要

We study the equivalence between non-perfect secret sharing (NSS) and symmetric private information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR are defined with an access structure, which corresponds to the authorized/forbidden sets for NSS and the response/collusion patterns for SPIR. We prove the equivalence between NSS and SPIR in the following two senses. 1) Given any SPIR protocol with an access structure, an NSS protocol is constructed with the same access structure and the same rate. 2) Given any linear NSS protocol with an access structure, a linear SPIR protocol is constructed with the same access structure and the same rate. We prove the first relation even if the SPIR protocol has imperfect correctness and secrecy. From the first relation, we derive an upper bound of the SPIR capacity for arbitrary response and collusion patterns. For the special case of $mathsf {n}$ -server SPIR with $mathsf {r}$ responsive and $mathsf {t}$ colluding servers, this upper bound proves that the SPIR capacity is $(mathsf {r}-mathsf {t})/mathsf {n}$ . From the second relation, we prove that a SPIR protocol exists for any response and collusion patterns.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号