Some Secret Sharing Based on Hyperplanes
Abstract
1. Introduction
2. Preliminaries
2.1. Difference Sets
2.2. Relative Difference Sets
2.3. Group Ring
2.4. Characters
3. Access Structures
3.1. Access Structures from Difference Sets
3.2. Access Structures from Semi-Regular Relative Difference Sets
4. Secret Sharing Scheme
4.1. Shamir Threshold Secret Sharing Scheme
4.2. Construction of Secret Sharing Scheme Based on Given Access Structure
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the International Workshop on Managing Requirements Knowledge, New York, NY, USA, 4–7 June 1979; p. 313. [Google Scholar]
- Ben-Or, M.; Goldwasser, S.; Wigderson, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; Association for Computing Machinery: New York, NY, USA, 2019; pp. 351–371. [Google Scholar]
- Chaum, D.; Crépeau, C.; Damgard, I. Multiparty unconditionally secure protocols. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, 2–4 May 1988; pp. 11–19. [Google Scholar]
- Cramer, R.; Damgård, I.; Maurer, U. General secure multi-party computation from any linear secret-sharing scheme. In Advances in Cryptology—EUROCRYPT 2000, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 316–334. [Google Scholar]
- Cramer, R.; Daza, V.; Gracia, I.; Urroz, J.J.; Leander, G.; Martí-Farré, J.; Padró, C. On codes, matroids, and secure multiparty computation from linear secret-sharing schemes. IEEE Trans. Inf. Theory 2008, 54, 2644–2657. [Google Scholar] [CrossRef]
- Wang, Z.; Cheung, S.C.; Luo, Y. Information-theoretic secure multi-party computation with collusion deterrence. IEEE Trans. Inf. Forensics Secur. 2016, 12, 980–995. [Google Scholar] [CrossRef]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
- Naor, M.; Wool, A. Access control and signatures via quorum secret sharing. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14–15 March 1996; pp. 157–168. [Google Scholar]
- Desmedt, Y. Threshold cryptosystems. In Advances in Cryptology—AUSCRYPT’92, Proceedings of the International Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, QLD, Australia, 13–16 December 1992; Springer: Berlin/Heidelberg, Germany, 1993; pp. 1–14. [Google Scholar]
- Karchmer, M.; Wigderson, A. On span programs. In Proceedings of the Eigth Annual Structure in Complexity Theory Conference, San Diego, CA, USA, 18–21 May 1993; pp. 102–111. [Google Scholar]
- McEliece, R.J.; Sarwate, D.V. On sharing secrets and Reed-Solomon codes. Commun. ACM 1981, 24, 583–584. [Google Scholar] [CrossRef]
- Massey, J.L. Minimal codewords and secret sharing. In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, Mölle, Sweden, 22–27 August 1993; pp. 276–279. [Google Scholar]
- Ito, M.; Saito, A.; Nishizeki, T. Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. (Part III Fundam. Electron. Sci.) 1989, 72, 56–64. [Google Scholar] [CrossRef]
- Tang, C.; Gao, S.; Zhang, C. The optimal linear secret sharing scheme for any given access structure. J. Syst. Sci. Complex. 2013, 26, 634–649. [Google Scholar] [CrossRef]
- Harn, L.; Hsu, C.; Zhang, M.; He, T.; Zhang, M. Realizing secret sharing with general access structure. Inf. Sci. 2016, 367, 209–220. [Google Scholar] [CrossRef]
- Ma, S.L.; Schmidt, B. Difference sets corresponding to a class of symmetric designs. Des. Codes Cryptogr. 1997, 10, 223–236. [Google Scholar] [CrossRef]
- Jungnickel, D. On automorphism groups of divisible designs. Can. J. Math. 1982, 34, 257–297. [Google Scholar] [CrossRef]
- Turyn, R. Character sums and difference sets. Pac. J. Math. 1965, 15, 319–346. [Google Scholar] [CrossRef]
- McFarl, R.L. A family of difference sets in non-cyclic groups. J. Comb. Theory Ser. A 1973, 15, 1–10. [Google Scholar] [CrossRef]
- Tassa, T.; Dyn, N. Multipartite secret sharing by bivariate interpolation. J. Cryptol. 2009, 22, 227–258. [Google Scholar] [CrossRef]
- Farras, O.; Padró, C.; Xing, C.; Yang, A. Natural generalizations of threshold secret sharing. IEEE Trans. Inf. Theory 2014, 60, 1652–1664. [Google Scholar] [CrossRef]
- Chen, Q.; Tang, C.; Lin, Z. Efficient explicit constructions of compartmented secret sharing schemes. Des. Codes Cryptogr. 2019, 87, 2913–2940. [Google Scholar] [CrossRef]
- Chen, Q.; Tang, C.; Lin, Z. Efficient explicit constructions of multipartite secret sharing schemes. IEEE Trans. Inf. Theory 2021, 68, 601–631. [Google Scholar] [CrossRef]
- Brickell, E.F. Some ideal secret sharing schemes. In Advances in Cryptology—EUROCRYPT’89, Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, 10–13 April 1989; Springer: Berlin/Heidelberg, Germany, 1990; pp. 468–475. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, G.; Chen, Y. Some Secret Sharing Based on Hyperplanes. Computation 2025, 13, 166. https://doi.org/10.3390/computation13070166
Wang G, Chen Y. Some Secret Sharing Based on Hyperplanes. Computation. 2025; 13(7):166. https://doi.org/10.3390/computation13070166
Chicago/Turabian StyleWang, Guohui, and Yucheng Chen. 2025. "Some Secret Sharing Based on Hyperplanes" Computation 13, no. 7: 166. https://doi.org/10.3390/computation13070166
APA StyleWang, G., & Chen, Y. (2025). Some Secret Sharing Based on Hyperplanes. Computation, 13(7), 166. https://doi.org/10.3390/computation13070166