breaking the circuit size barrier in secret sharing
play

Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu - PowerPoint PPT Presentation

Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu Vinod Vaikuntanathan MIT MIT 50th ACM Symposium on Theory of Computing June 27, 2018 Secret Sharing [Blakley79,Shamir79,Ito-Saito-Nishizeki87] Secret Secret Sharing


  1. Breaking the Circuit-Size Barrier in Secret Sharing Tianren Liu Vinod Vaikuntanathan MIT MIT 50th ACM Symposium on Theory of Computing June 27, 2018

  2. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret

  3. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3

  4. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3

  5. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret?

  6. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information.

  7. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information. General Secret Sharing [ISN’89] monotone F : { 0 , 1 } n → { 0 , 1 } Any subset X that F ( X ) = 1 can recover the secret. Any subset X that F ( X ) = 0 learns no information.

  8. Secret Sharing [Blakley’79,Shamir’79,Ito-Saito-Nishizeki’87] Secret share 1 share 5 share 2 share 4 share 3 Can this subset of participants recover the secret? Threshold Secret Sharing [Shamir’79] Any subset of ≥ k participants can recover the secret. Any subset of < k participants learns no information. General Secret Sharing [ISN’89] monotone F : { 0 , 1 } n → { 0 , 1 } Any subset X that F ( X ) = 1 can recover the secret. Any subset X that F ( X ) = 0 learns no information.

  9. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  10. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  11. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s ◮ Output wire tag: the secret s � ◮ AND gate: additively share the output wire tag ◮ OR gate: copy the output wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  12. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � ◮ The i -th participant’s share: x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  13. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  14. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  15. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  16. A General Secret Sharing Scheme [Benaloh-Leichter’88] F is computed by some monotone formula ◮ Generate a tag for each wire s s.t. r 1 + r 2 + r 3 ◮ Output wire tag: the secret s � ◮ AND gate: additively share = s r 1 r 3 the output wire tag ◮ OR gate: copy the output r 2 wire tag � � � r 1 r 2 r 3 ◮ The i -th participant’s share: r 1 r 2 r 3 x 1 x 2 x 3 x 4 all tags of its input wires Total share size = formula size of F ≤ ˜ O (2 n )

  17. Key Complexity Measure: Total Share Size Upper Bounds Share size = O (monotone formula size) [Benaloh-Leichter’88]

  18. Key Complexity Measure: Total Share Size Upper Bounds Share size = O (monotone formula size) [Benaloh-Leichter’88] Share size = O (monotone span program size) [Karchmer-Wigderson’93]

  19. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) .

  20. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97]

  21. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97] (No better lower bounds, even existentially.)

  22. Key Complexity Measure: Total Share Size Upper Bounds 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = O (monotone span program size) ≤ poly( n ) . Lower Bounds Exists an explicit F s.t. total share size = ˜ Ω( n 2 ). [Csirmaz’97] (No better lower bounds, even existentially.) Can we do better? 30 + -year-old open problem

  23. Our Results Yes, we can! Theorem 1 Every monotone F has a secret sharing scheme with share size 2 0 . 994 n .

  24. Key Complexity Measure: Total Share Size Upper Bounds: Linear Linear Secret Sharing Linear 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = Θ(monotone span program size) ≤ poly( n ) . Lower Bounds: Linear Linear Secret Sharing Linear Exists { F n } s.t. total share size = ˜ Ω(2 n / 2 ). Can we do better?

  25. Key Complexity Measure: Total Share Size Upper Bounds: Linear Linear Secret Sharing Linear 2 n Share size = O (monotone formula size) ≤ poly( n ) . 2 n Share size = Θ(monotone span program size) ≤ poly( n ) . Lower Bounds: Linear Linear Secret Sharing Linear Exists { F n } s.t. total share size = ˜ Ω(2 n / 2 ). (2 Ω( n ) for an explicit { F n } [Pitassi-Robere’18]) Can we do better?

  26. Our Results Yes, we can! Theorem 2 Every monotone F has a linear secret sharing with share size 2 0 . 999 n .

  27. Our Results Yes, we can! Theorem 2 Every monotone F has a linear secret sharing with share size 2 0 . 999 n . Corollary Every monotone F has a monotone span program of size 2 0 . 999 n .

  28. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I Prop. II

  29. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II

  30. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size � log(#Monotone Functions) ≥ poly( n )

  31. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size × log(#Base Gates) ≥ log(#Monotone Functions) ≥ poly( n )

  32. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n Prop. II 2 n Formula size × log(#Base Gates) ≥ log(#Monotone Functions) ≥ poly( n ) ⇒ Requires 2 ˜ Ω(2 n ) gates in formula basis. =

  33. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n using an extended basis of 2 ˜ Ω(2 n ) gates Prop. II

  34. Our Approach Every monotone F can be computed by a monotone formula s.t. Prop. I has size 2 0 . 994 n using an extended basis of 2 ˜ Ω(2 n ) gates Prop. II every gate in the basis is a monotone function that has an efficient secret sharing scheme

Recommend


More recommend