We then show an impossibility result indicating that a similar equivalence does not hold for Multiparty Computation (MPC): we show that even if protocols are given black-box access for free to an idealized secret sharing scheme secure for the access structure in question, it is not possible to handle all relevant access structures efficiently, not even if the adversary is passive and static. In other words, general MPC can only be black-box reduced efficiently to secret sharing if extra properties of the secret sharing scheme used (such as linearity) are assumed.
Category / Keywords: foundations / secure multi-party computation, verifiable secret sharing Publication Info: Appears in the Proceedings of STOC '00, ACM, May 2000. Date: received 27 Jul 2000 Contact author: cramer at brics dk, ivan@daimi aau dk, stefand@brics dk Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | BibTeX Citation Version: 20000727:155815 (All versions of this report) Short URL: ia.cr/2000/038 Discussion forum: Show discussion | Start new discussion