Monotone circuits for monotone weighted threshold functions

Weighted threshold functions with positive weights are a natural generalization of unweighted threshold functions. These functions are clearly monotone. However, the naive way of computing them is adding the weights of the satisfied variables and checking if the sum is greater than the threshold; this algorithm is inherently non-monotone since addition is a non-monotone function. In this work we by-pass this addition step and construct a polynomial size logarithmic depth unbounded fan-in monotone circuit for every weighted threshold function, i.e., we show that weighted threshold functions are in mAC^1. (To the best of our knowledge, prior to our work no polynomial monotone circuits were known for weighted threshold functions.) Our monotone circuits are applicable for the cryptographic tool of secret sharing schemes. Using general results for compiling monotone circuits (Yao, 1989) and monotone formulae (Benaloh and Leichter, 1990) into secret sharing schemes, we get secret sharing schemes for every weighted threshold access structure. Specifically, we get: (1) information-theoretic secret sharing schemes where the size of each share is quasi-polynomial in the number of users, and (2) computational secret sharing schemes where the size of each share is polynomial in the number of users.

[1]  Marek Karpinski,et al.  Simulating Threshold Circuits by Majority Circuits , 1998, SIAM J. Comput..

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  Georg Schnitger,et al.  Parallel Computation with Threshold Functions , 1986, J. Comput. Syst. Sci..

[4]  Georg Schnitger,et al.  Parallel Computation with Threshold Functions , 1988, J. Comput. Syst. Sci..

[5]  N. Littlestone Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[6]  Akira Maruoka,et al.  Better Simulation of Exponential Threshold Weights by Polynomial Weights , 2004, Electron. Colloquium Comput. Complex..

[7]  Saburo Muroga,et al.  Threshold logic and its applications , 1971 .

[8]  D. H. Jacobsohn,et al.  A Suggestion for a Fast Multiplier , 1964, IEEE Trans. Electron. Comput..

[9]  Leslie G. Valiant,et al.  Short Monotone Formulae for the Majority Function , 1984, J. Algorithms.

[10]  Josh Benaloh,et al.  Generalized Secret Sharing and Monotone Functions , 1990, CRYPTO.

[11]  János Komlós,et al.  An 0(n log n) sorting network , 1983, STOC.

[12]  Rocco A. Servedio,et al.  Monotone Boolean formulas can approximate monotone linear threshold functions , 2004, Discret. Appl. Math..

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Johan Håstad,et al.  On the Size of Weights for Threshold Gates , 1994, SIAM J. Discret. Math..

[15]  Tamir Tassa,et al.  Characterizing Ideal Weighted Threshold Secret Sharing , 2005, TCC.

[16]  Ingo Wegener,et al.  Relating Monotone Formula Size and Monotone Depth of Boolean Functions , 1983, Inf. Process. Lett..

[17]  Weighted Threshold Secret Sharing Schemes , 1999, Inf. Process. Lett..

[18]  Enav Weinreb,et al.  Monotone circuits for weighted threshold functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[19]  Alexander A. Razborov,et al.  Majority gates vs. general weighted threshold gates , 2005, computational complexity.

[20]  Yuri Petrovich Ofman,et al.  On the Algorithmic Complexity of Discrete Functions , 1962 .

[21]  K. Srinathan,et al.  On the Power of Computational Secret Sharing , 2003, INDOCRYPT.

[22]  E. Szemerédi,et al.  O(n LOG n) SORTING NETWORK. , 1983 .