We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared value to the characteristic of the underlying field without interaction. Some of these schemes are in addition strongly multiplicative. Our formulas can also be used to construct multiparty protocols from protocols for a constant number of parties. In particular we implement black-box multiparty computation over non-Abelian groups in a way that is much simpler than previously known and we also show how to get a protocol in this setting that is efficient and actively secure against a constant fraction of corrupted parties, a long standing open problem. Finally, we show a negative result on usage of our scheme for pseudorandom secret sharing as defined by Cramer, Damg̊ard and Ishai.
[1]
Ron Steinfeld,et al.
Graph Coloring Applied to Secure Computation in Non-Abelian Groups
,
2011,
Journal of Cryptology.
[2]
Josh Benaloh,et al.
Generalized Secret Sharing and Monotone Functions
,
1990,
CRYPTO.
[3]
David A. Mix Barrington,et al.
Bounded-width polynomial-size branching programs recognize exactly those languages in NC1
,
1986,
STOC '86.
[4]
Ron Steinfeld,et al.
Active Security in Multiparty Computation over Black-Box Groups
,
2012,
SCN.
[5]
Leslie G. Valiant,et al.
Short Monotone Formulae for the Majority Function
,
1984,
J. Algorithms.
[6]
Yuval Ishai,et al.
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation
,
2005,
TCC.
[7]
Ueli Maurer,et al.
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
,
2000,
Journal of Cryptology.