1999
DOI: 10.1007/s004930050058
|View full text |Cite
|
Sign up to set email alerts
|

Superpolynomial Lower Bounds for Monotone Span Programs

Abstract: In this paper we obtain the first superpolynomial lower bounds for monotone span programs computing explicit functions. The best previous lower bound was Ω(n 5/2 ) by Beimel, Gál, Paterson [BGP]; our proof exploits a general combinatorial lower bound criterion from that paper. Our lower bounds are based on an analysis of Paley-type bipartite graphs via Weil's character sum estimates. We prove an n Ω(log n/ log log n) lower bound for the size of monotone span programs for the clique problem. Our results give th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
105
0

Year Published

1999
1999
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 76 publications
(110 citation statements)
references
References 38 publications
5
105
0
Order By: Relevance
“…The best known lower bounds for linear secret-sharing schemes is n Ω(log n) [1,16,17]. By modification of the claims in [17], we show that these lower bounds hold also for multi-linear secret-sharing schemes.…”
Section: Lower Bounds For Multi-linear Secret-sharing Schemesmentioning
confidence: 77%
See 3 more Smart Citations
“…The best known lower bounds for linear secret-sharing schemes is n Ω(log n) [1,16,17]. By modification of the claims in [17], we show that these lower bounds hold also for multi-linear secret-sharing schemes.…”
Section: Lower Bounds For Multi-linear Secret-sharing Schemesmentioning
confidence: 77%
“…Let ψ : G 1 → G 2 be a group homomorphism, and φ : G 2 N a group action. Then ψ induces a group action ψ * (φ): G 1 N , given by composition (ψ * (φ))(x) := φ(ψ(x)). Furthermore, if ψ is surjective and the action φ is non-trivial then so is ψ * (φ).…”
Section: A the Construction Of The Group G Pmentioning
confidence: 99%
See 2 more Smart Citations
“…Linear secret-sharing schemes are equivalent to monotone span programs, defined by [46]. Super-polynomial lower bounds for monotone span programs and, therefore, for linear secret-sharing schemes were proved in [5,2,36].…”
Section: Example 1 (Attribute Based Encryption)mentioning
confidence: 99%