Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Guruswami, Venkatesan (Ed.)A Homomorphic Secret Sharing (HSS) scheme is a secret-sharing scheme that shares a secret x among s servers, and additionally allows an output client to reconstruct some function f(x), using information that can be locally computed by each server. A key parameter in HSS schemes is download rate, which quantifies how much information the output client needs to download from each server. Recent work (Fosli, Ishai, Kolobov, and Wootters, ITCS 2022) established a fundamental limitation on the download rate of linear HSS schemes for computing low-degree polynomials, and gave an example of HSS schemes that meet this limit. In this paper, we further explore optimal-rate linear HSS schemes for polynomials. Our main result is a complete characterization of such schemes, in terms of a coding-theoretic notion that we introduce, termed optimal labelweight codes. We use this characterization to answer open questions about the amortization required by HSS schemes that achieve optimal download rate. In more detail, the construction of Fosli et al. required amortization over π instances of the problem, and only worked for particular values of π. We show that - perhaps surprisingly - the set of πβs for which their construction works is in fact nearly optimal, possibly leaving out only one additional value of π. We show this by using our coding-theoretic characterization to prove a necessary condition on the πβs admitting optimal-rate linear HSS schemes. We then provide a slightly improved construction of optimal-rate linear HSS schemes, where the set of allowable πβs is optimal in even more parameter settings. Moreover, based on a connection to the MDS conjecture, we conjecture that our construction is optimal for all parameter regimes.more » « less
-
Kumar, Amit; Ron-Zewi, Noga (Ed.)The Gilbert-Varshamov (GV) bound is a classical existential result in coding theory. It implies that a random linear binary code of rate Ρ² has relative distance at least 1/2 - O(Ξ΅) with high probability. However, it is a major challenge to construct explicit codes with similar parameters. One hope to derandomize the Gilbert-Varshamov construction is with code concatenation: We begin with a (hopefully explicit) outer code π_out over a large alphabet, and concatenate that with a small binary random linear code π_in. It is known that when we use independent small codes for each coordinate, then the result lies on the GV bound with high probability, but this still uses a lot of randomness. In this paper, we consider the question of whether code concatenation with a single random linear inner code π_in can lie on the GV bound; and if so what conditions on π_out are sufficient for this. We show that first, there do exist linear outer codes π_out that are "good" for concatenation in this sense (in fact, most linear codes codes are good). We also provide two sufficient conditions for π_out, so that if π_out satisfies these, π_outβπ_in will likely lie on the GV bound. We hope that these conditions may inspire future work towards constructing explicit codes π_out.more » « less
An official website of the United States government

Full Text Available