Separating the power of monotone span programs over different fields

Monotone span programs are a linear-algebraic model of computation. They are equivalent to linear secret sharing schemes and have various applications in cryptography and complexity. A fundamental question is how the choice of the field in which the algebraic operations are performed effects the power of the span program. In this paper we prove that the power of monotone span programs over finite fields of different characteristics is incomparable; we show a super-polynomial separation between any two fields with different characteristics, answering an open problem of Pudlak and Sgall (1998). Using this result we prove a super-polynomial lower bound for monotone span programs for a function in uniform - /spl Nscr/;/spl Cscr/;/sup 2/ (and therefore in /spl Pscr/;), answering an open problem of Babai, Wigderson, and Gal (1999). Finally, we show that quasi-linear schemes, a generalization of linear secret sharing schemes introduced in Beimel and Ishai (2001), are stronger than linear secret sharing schemes. In particular, this proves, without any assumptions, that non-linear secret sharing schemes are more efficient than linear secret sharing schemes.

[1]  Anna Gál,et al.  Lower bounds for monotone span programs , 2005, computational complexity.

[2]  Roman Smolensky,et al.  Algebraic methods in the theory of lower bounds for Boolean circuit complexity , 1987, STOC.

[3]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[4]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[5]  Stuart J. Berkowitz,et al.  On Computing the Determinant in Small Parallel Time Using a Small Number of Processors , 1984, Inf. Process. Lett..

[6]  Stephen Smale,et al.  On a theory of computation over the real numbers; NP completeness, recursive functions and universal machines , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[7]  Jirí Sgall,et al.  Algebraic models of computation and interpolation for algebraic proof systems , 1996, Proof Complexity and Feasible Arithmetics.

[8]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[9]  Gordon F. Royle,et al.  Algebraic Graph Theory , 2001, Graduate texts in mathematics.

[10]  Pavel Pudlák Monotone complexity and the rank of matrices , 2002, Electron. Colloquium Comput. Complex..

[11]  Avi Wigderson,et al.  Superpolynomial Lower Bounds for Monotone Span Programs , 1996, Comb..

[12]  Alexander A. Razborov,et al.  Applications of matrix methods to the theory of lower bounds in computational complexity , 1990, Comb..

[13]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[14]  Moni Naor,et al.  Distributed Pseudo-random Functions and KDCs , 1999, EUROCRYPT.

[15]  Christoph Meinel,et al.  On relations between counting communication complexity classes , 2004, J. Comput. Syst. Sci..

[16]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[17]  P. Frankl,et al.  Linear Algebra Methods in Combinatorics I , 1988 .

[18]  Enav Weinreb,et al.  Separating the Power of Monotone Span Programs over Different Fields , 2005, SIAM J. Comput..

[19]  Yuval Ishai,et al.  On the power of nonlinear secret-sharing , 2001, Proceedings 16th Annual IEEE Conference on Computational Complexity.

[20]  Ketan Mulmuley,et al.  A fast parallel algorithm to compute the rank of a matrix over an arbitrary field , 1986, STOC '86.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Christoph Meinel,et al.  Structure and importance of logspace-MOD class , 1992, Mathematical systems theory.

[23]  E. Kushilevitz,et al.  Communication Complexity: Basics , 1996 .

[24]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[25]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[26]  S. Smale,et al.  On a theory of computation and complexity over the real numbers; np-completeness , 1989 .

[27]  Eli Ben-Sasson,et al.  Random Cnf’s are Hard for the Polynomial Calculus , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[28]  S. Smale,et al.  On a theory of computation and complexity over the real numbers; np-completeness , 1989 .

[29]  Anna Gál A characterization of span program size and improved lower bounds for monotone span programs , 1998, STOC '98.

[30]  Kurt Mehlhorn,et al.  Las Vegas is better than determinism in VLSI and distributed computing (Extended Abstract) , 1982, STOC '82.