ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2101.11194
34
4
v1v2v3 (latest)

Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure

27 January 2021
Seunghoan Song
Masahito Hayashi
ArXiv (abs)PDFHTML
Abstract

We study the equivalence between non-perfect secret sharing (NSS) and symmetric private information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR are defined with an access structure, which corresponds to the authorized/forbidden sets for NSS and the response/collusion patterns for SPIR. We prove the equivalence between NSS and SPIR in the following two senses. 1) Given any SPIR protocol with an access structure, an NSS protocol is constructed with the same access structure and the same rate. 2) Given any linear NSS protocol with an access structure, a linear SPIR protocol is constructed with the same access structure and the same rate. We prove the first relation even if the SPIR protocol has imperfect correctness and secrecy. From the first relation, we derive an upper bound of the SPIR capacity for arbitrary response and collusion patterns. For the special case of n\mathsf{n}n-server SPIR with r\mathsf{r}r responsive and t\mathsf{t}t colluding servers, this upper bound proves that the SPIR capacity is (r−t)/n(\mathsf{r}-\mathsf{t})/\mathsf{n}(r−t)/n. From the second relation, we prove that a SPIR protocol exists for any response and collusion patterns.

View on arXiv
Comments on this paper