1,788 research outputs found
Construction of Multiplicative Monotone Span Program
Multiplicative monotone span program is one of the important tools to realize secure multiparty computation. It is essential to construct multiplicative monotone span programs for secure multiparty computations. For any access structure, Cramer et al. gave a method to construct multiplicative monotone span programs, but its row size became double, and the column size also increased. In this paper, we propose a new construction which can get a multiplicative monotone span program with the row size less than double without changing the column size
Fourier-based Function Secret Sharing with General Access Structure
Function secret sharing (FSS) scheme is a mechanism that calculates a
function f(x) for x in {0,1}^n which is shared among p parties, by using
distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the
function f:{0,1}^n -> G is kept secret to the parties. Ohsawa et al. in 2017
observed that any function f can be described as a linear combination of the
basis functions by regarding the function space as a vector space of dimension
2^n and gave new FSS schemes based on the Fourier basis. All existing FSS
schemes are of (p,p)-threshold type. That is, to compute f(x), we have to
collect f_i(x) for all the distributed functions. In this paper, as in the
secret sharing schemes, we consider FSS schemes with any general access
structure. To do this, we observe that Fourier-based FSS schemes by Ohsawa et
al. are compatible with linear secret sharing scheme. By incorporating the
techniques of linear secret sharing with any general access structure into the
Fourier-based FSS schemes, we show Fourier-based FSS schemes with any general
access structure.Comment: 12 page
Simply Exponential Approximation of the Permanent of Positive Semidefinite Matrices
We design a deterministic polynomial time approximation algorithm for
the permanent of positive semidefinite matrices where . We write a natural convex relaxation and show that its optimum solution
gives a approximation of the permanent. We further show that this factor
is asymptotically tight by constructing a family of positive semidefinite
matrices
Approximating acyclicity parameters of sparse hypergraphs
The notions of hypertree width and generalized hypertree width were
introduced by Gottlob, Leone, and Scarcello in order to extend the concept of
hypergraph acyclicity. These notions were further generalized by Grohe and
Marx, who introduced the fractional hypertree width of a hypergraph. All these
width parameters on hypergraphs are useful for extending tractability of many
problems in database theory and artificial intelligence. In this paper, we
study the approximability of (generalized, fractional) hyper treewidth of
sparse hypergraphs where the criterion of sparsity reflects the sparsity of
their incidence graphs. Our first step is to prove that the (generalized,
fractional) hypertree width of a hypergraph H is constant-factor sandwiched by
the treewidth of its incidence graph, when the incidence graph belongs to some
apex-minor-free graph class. This determines the combinatorial borderline above
which the notion of (generalized, fractional) hypertree width becomes
essentially more general than treewidth, justifying that way its functionality
as a hypergraph acyclicity measure. While for more general sparse families of
hypergraphs treewidth of incidence graphs and all hypertree width parameters
may differ arbitrarily, there are sparse families where a constant factor
approximation algorithm is possible. In particular, we give a constant factor
approximation polynomial time algorithm for (generalized, fractional) hypertree
width on hypergraphs whose incidence graphs belong to some H-minor-free graph
class
Fast Monotone Summation over Disjoint Sets
We study the problem of computing an ensemble of multiple sums where the
summands in each sum are indexed by subsets of size of an -element
ground set. More precisely, the task is to compute, for each subset of size
of the ground set, the sum over the values of all subsets of size that are
disjoint from the subset of size . We present an arithmetic circuit that,
without subtraction, solves the problem using arithmetic
gates, all monotone; for constant , this is within the factor
of the optimal. The circuit design is based on viewing the summation as a "set
nucleation" task and using a tree-projection approach to implement the
nucleation. Applications include improved algorithms for counting heaviest
-paths in a weighted graph, computing permanents of rectangular matrices,
and dynamic feature selection in machine learning
An Epitome of Multi Secret Sharing Schemes for General Access Structure
Secret sharing schemes are widely used now a days in various applications,
which need more security, trust and reliability. In secret sharing scheme, the
secret is divided among the participants and only authorized set of
participants can recover the secret by combining their shares. The authorized
set of participants are called access structure of the scheme. In Multi-Secret
Sharing Scheme (MSSS), k different secrets are distributed among the
participants, each one according to an access structure. Multi-secret sharing
schemes have been studied extensively by the cryptographic community. Number of
schemes are proposed for the threshold multi-secret sharing and multi-secret
sharing according to generalized access structure with various features. In
this survey we explore the important constructions of multi-secret sharing for
the generalized access structure with their merits and demerits. The features
like whether shares can be reused, participants can be enrolled or dis-enrolled
efficiently, whether shares have to modified in the renewal phase etc., are
considered for the evaluation
- …