breaking the circuit size barrier in secret sharing
play

Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu - PowerPoint PPT Presentation

Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu Vinod Vaikuntanathan MIT MIT 50th ACM Symposium on Theory of Computing June 27, 2018 Secret Sharing [Blakley79,Shamir79,Ito-Saito-Nishizeki87] Secret Secret Sharing


  1. Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu Vinod Vaikuntanathan MIT MIT 50th ACM Symposium on Theory of Computing June 27, 2018

  2. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret

  3. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3

  4. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3

  5. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret?

  6. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information.

  7. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information. General Secret Sharing [ISN’89] monotone F : { 0 , 1 } n → { 0 , 1 } Any subset X that F ( X ) = 1 can recover the secret. Any subset X that F ( X ) = 0 learns no information.

  8. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information. General Secret Sharing [ISN’89] monotone F : { 0 , 1 } n → { 0 , 1 } Any subset X that F ( X ) = 1 can recover the secret. Any subset X that F ( X ) = 0 learns no information.

  9. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  10. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  11. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  12. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  13. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  14. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  15. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  16. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  17. Key Complexity Measure: Total Share Size Upper Bounds Share size = O (monotone formula size) [Benaloh-Leichter’88]

  18. Key Complexity Measure: Total Share Size Upper Bounds Share size = O (monotone formula size) [Benaloh-Leichter’88] Share size = O (monotone span program size) [Karchmer-Wigderson’93]

  19. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) .

  20. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97]

  21. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97] (No better lower bounds, even existentially.)

  22. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97] (No better lower bounds, even existentially.) Can we do better? 30 + -year-old open problem

  23. Our Results Yes, we can! Theorem 1 Every monotone F has a secret sharing scheme with share size 2 0 . 994 n .

  24. Key Complexity Measure: Total Share Size Upper Bounds: Linear Linear Secret Sharing Linear 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = Θ(monotone span program size) ≤ poly( n ) . Lower Bounds: Linear Linear Secret Sharing Linear Exists { F n } s.t. total share size = ˜ Ω(2 n / 2 ). Can we do better?

  25. Key Complexity Measure: Total Share Size Upper Bounds: Linear Linear Secret Sharing Linear 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = Θ(monotone span program size) ≤ poly( n ) . Lower Bounds: Linear Linear Secret Sharing Linear Exists { F n } s.t. total share size = ˜ Ω(2 n / 2 ). (2 Ω( n ) for an explicit { F n } [Pitassi-Robere’18]) Can we do better?

  26. Our Results Yes, we can! Theorem 2 Every monotone F has a linear secret sharing with share size 2 0 . 999 n .

  27. Our Results Yes, we can! Theorem 2 Every monotone F has a linear secret sharing with share size 2 0 . 999 n . Corollary Every monotone F has a monotone span program of size 2 0 . 999 n .

  28. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I Prop. II

  29. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II

  30. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size � log(#Monotone Functions) ≥ poly( n )

  31. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size × log(#Base Gates) ≥ log(#Monotone Functions) ≥ poly( n )

  32. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size × log(#Base Gates) ≥ log(#Monotone Functions) ≥ poly( n ) ⇒ Requires 2 ˜ Ω(2 n ) gates in formula basis. =

  33. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n using an extended basis of 2 ˜ Ω(2 n ) gates Prop. II

  34. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n using an extended basis of 2 ˜ Ω(2 n ) gates Prop. II every gate in the basis is a monotone function that has an efficient secret sharing scheme

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend