07.11.2014 Views

Share conversion, pseudorandom secret-sharing and ... - of the NVTI

Share conversion, pseudorandom secret-sharing and ... - of the NVTI

Share conversion, pseudorandom secret-sharing and ... - of the NVTI

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Theoretical Results on <strong>Share</strong> Compressio<br />

Thm.: Pseudo-r<strong>and</strong>om <strong>secret</strong> <strong>sharing</strong> schemes<br />

pressed to any linear <strong>secret</strong> <strong>sharing</strong> scheme<br />

Pro<strong>of</strong>: generalize <strong>the</strong> Shamir compression usin<br />

monotone span programs<br />

Thm.:<br />

Our approach is optimal in <strong>the</strong> model<br />

player gets a subset <strong>of</strong> a given collection <strong>of</strong> in<br />

distributed r<strong>and</strong>om sources<br />

Pro<strong>of</strong>: By information <strong>the</strong>oretic arguments: # ra<br />

# maximal unqualied sets

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!