Separating the power of monotone span programs over different fields

被引:17
作者
Beimel, A [1 ]
Weinreb, E [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
关键词
monotone span programs; algebraic models of computation; lower bounds; secret sharing;
D O I
10.1137/S0097539704444038
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Monotone span programs represent a linear-algebraic model of computation. They are equivalent to linear secret sharing schemes and have various applications in cryptography and complexity. A fundamental question regarding them is how the choice of the field in which the algebraic operations are performed affects the power of the span program. In this paper we prove that the power of monotone span programs over finite fields of different characteristics is incomparable; we show a superpolynomial separation between any two fields with different characteristics, solving an open problem of Pudlak and Sgall [Algebraic models of computation and interpolation for algebraic proof systems, in Proof Complexity and Feasible Arithmetic, DIMACS Ser. Discrete Math. Theoret. Comput. Sci. 39, P. W. Beame and S. Buss, eds., AMS, Providence, RI, 1998, pp. 279-296]. Using this result we prove a superpolynomial lower bound for monotone span programs for a function in uniform-NC2 (and therefore in P), solving an open problem of Babai, Gal, and Wigderson [Combinatorica, 19 (1999), pp. 301-319]. (All previous superpolynomial lower bounds for monotone span programs were for functions not known to be in P.) Finally, we show that quasi-linear secret sharing schemes, a generalization of linear secret sharing schemes introduced in Beimel and Ishai [On the power of nonlinear secret-sharing, in Proceedings of the 16th Annual IEEE Conference on Computational Complexity, 2001, pp. 188-202], are stronger than linear secret sharing schemes. In particular, this proves, without any assumptions, that nonlinear secret sharing schemes are more efficient than linear secret sharing schemes.
引用
收藏
页码:1196 / 1215
页数:20
相关论文
共 29 条
[1]  
[Anonymous], 1997, COMMUNICATION COMPLE
[2]  
[Anonymous], CONT CRYPTOLOGY SCI
[3]   Superpolynomial lower bounds for monotone span programs [J].
Babai, L ;
Gál, A ;
Wigderson, A .
COMBINATORICA, 1999, 19 (03) :301-319
[4]  
BABAI L, 1992, UNPUB LINEAR ALGEBRA
[5]   Separating the power of monotone span programs over different fields [J].
Beimel, A ;
Weinreb, E .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :428-437
[6]  
Beimel A, 2000, ANN IEEE CONF COMPUT, P188, DOI 10.1109/CCC.2001.933886
[7]   Lower bounds for monotone span programs [J].
Beimel, A ;
Gal, A ;
Paterson, M .
COMPUTATIONAL COMPLEXITY, 1996, 6 (01) :29-45
[8]  
Ben-Sasson E., 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039), P415, DOI 10.1109/SFFCS.1999.814613
[9]   ON COMPUTING THE DETERMINANT IN SMALL PARALLEL TIME USING A SMALL NUMBER OF PROCESSORS [J].
BERKOWITZ, SJ .
INFORMATION PROCESSING LETTERS, 1984, 18 (03) :147-150
[10]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, V48, P313, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]