Abstract
The secret sharing schemes (SSS) are widely used in secure multi-party computing and distributed computing, and the access structure is the key to constructing secret sharing schemes. In this paper, we propose a method for constructing access structures based on hyperplane combinatorial structures over finite fields. According to the given access structure, the corresponding secret sharing scheme that can identify cheaters is given. This scheme enables the secret to be correctly restored if the cheater does not exceed the threshold, and the cheating behavior can be detected and located.
1. Introduction
The concept of secret sharing schemes (SSS) was introduced in 1979 by Shamir [1] and Blakley [2]. These schemes allow a secret to be divided into several parts, which are then distributed among participants. Only specific subsets of participants, known as qualified subsets, can reconstruct the original secret, while no information about the secret is accessible to unqualified subsets. The collection of all qualified subsets forms what is referred to as the access structure.
An SSS is considered perfect if no information about the secret is leaked to unqualified subsets. If any unqualified subset is able to obtain partial or full information about the secret, the scheme is deemed non-perfect. An SSS is classified as linear if the shares are generated through a linear transformation, and it is ideal if the size of each share is exactly equal to that of the secret.
The study of secret sharing schemes remains a vital area of modern cryptography, serving as a foundational element in the development of security protocols and encryption algorithms. The ideal linear SSS has promising applications in various cryptographic protocols, including secure multi-party computation [3,4,5,6,7], attribute-based encryption [8], digital signatures [9], and threshold cryptography [10]. Consequently, efficient methods for constructing an ideal linear SSS are a crucial area of research.
It has been established that there is a one-to-one correspondence between linear codes and SSS [11], with linear codes being a crucial tool for realizing linear secret sharing schemes. In theory, every linear code can be utilized to create an SSS, but identifying the corresponding access structure for a given scheme remains a challenging task. Conversely, it is equally difficult to find an ideal secret sharing scheme for any arbitrary access structure. Researchers have explored various access structures and derived conclusions about the ideal secret sharing schemes that correspond to them.
In 1981, McEliece and Sarwate [12] made significant contributions to the study of SSSs based on linear codes, constructing a threshold scheme using Reed-Solomon codes and highlighting the equivalence between Shamir’s SSS and Reed-Solomon codes. Massey [13] noted that the primary challenge in using linear codes to construct SSSs is characterizing the types of access structures that can be achieved. Ito et al. [14] demonstrated that it is possible to construct linear secret sharing schemes for arbitrary access structures, although these schemes are inefficient, as the length of the key increases exponentially with the number of participants. In 2013, Tang et al. [15] showed that achieving an optimal linear code for a given access structure is equivalent to solving a quadratic system of equations formed by the access structure and its corresponding adversary structure. They also developed an algorithm to determine the optimal linear code. More recently, Harn et al. [16] introduced a general secret sharing scheme based on classical schemes and presented methods for using Karnaugh maps to identify minimal access structures and maximal adversary structures for a given access structure.
Despite these advancements, numerous challenges remain in relation to secret sharing schemes for given access structures. In this paper, we build on existing research and propose a method for constructing the corresponding access structure using difference sets and relative difference sets generated by hyperplanes. For these access structures, we employ polynomial codes to create ideal linear secret sharing schemes that can detect participants exhibiting deceptive behavior.
The structure of this paper is as follows. Section 2 presents a review of the notations and fundamental results related to difference sets. In Section 3, we introduce various families of access structures derived from the combinatorial properties of hyperplanes. Section 4 utilizes these access structures to design several secret sharing schemes. Finally, Section 5 provides a conclusion to the paper.
2. Preliminaries
2.1. Difference Sets
A k-element subset D of a group G is called a -difference set if the multiset
contains every nonidentity element of G exactly times, where G be a finite multiplicative group of order v. From a counting perspective, the parameters of a difference set satisfy the relation . We assume because if D is a -difference set, then its complement forms a -difference set in G. Typically, the trivial cases and are excluded.
Difference sets are significant in both theoretical and practical applications. In design theory, the concept of a -difference set in G is equivalent to the symmetric -design in G [17].
2.2. Relative Difference Sets
A k-element subset R of a group G that includes a normal subgroup U of order u is called a relative difference set (RDS) in G relative to U if the multiset
contains every element of exactly times, and does not include any element from U, where G be a finite multiplicative group of order . The subgroup U is referred to as the forbidden subgroup.
An RDS in G relative to a normal subgroup U is equivalent to a square-divisible -design, where the group G acts regularly on both points and blocks [18].
From a counting perspective, the parameters of an RDS satisfy the relation . If , the RDS is termed semi-regular, and its parameters are . Unlike difference sets, the complement of an RDS is generally not an RDS. The trivial cases where and are typically excluded. A difference set can be seen as an RDS where .
2.3. Group Ring
Difference sets are often analyzed within the framework of the group ring , which is the group ring of G over the integers . The definition of a -difference set D in G can be expressed by the following equation in :
Here, for convenience, we identify the sets D, , and G with the corresponding group ring elements:
and denotes the identity element of G.
Similarly, the definition of a relative difference set (RDS) R in G relative to a normal subgroup U is equivalent to the equation:
in the group ring .
2.4. Characters
In the case of an abelian group, a character of G is a homomorphism from G to the multiplicative group of complex roots of unity. The set of all such characters, denoted by , forms a group under pointwise multiplication, and this group is isomorphic to G. The identity element in this group is the trivial character, which maps every element of G to 1. The character sum of a character over a group ring element D corresponding to a subset of G is given by:
It is a well-established result that the character sum equals 0 for all nontrivial characters of G if and only if D is a multiple of G, when considered as a group ring element. Additionally, the sum
is nonzero if and only if .
If a character is nontrivial on G but trivial on a subgroup U, it induces a nontrivial character on the quotient group , defined by . This definition is well-defined because if , then there exists an element such that , and since for all , the value of does not depend on the choice of representative.
The application of character sums to investigate difference sets in abelian groups was first introduced by Turyn in his groundbreaking work [19], and later this approach was expanded to generalized difference sets (RDSs).
Lemma 1
([19]). (i) A subset D of size k in an abelian group G of order v is a -difference set in G if and only if for every nontrivial character χ of G, we have .
(ii) A subset R of size k in an abelian group G of order , which contains a subgroup U of order u, is a -RDS in G relative to U if and only if for every nontrivial character χ of G, the following conditions hold:
The character properties specified in Lemma 1 for a subset D or R necessitate that the parameters and (which are implicitly defined) must be integers.
3. Access Structures
3.1. Access Structures from Difference Sets
Let be a finite field of order q, where q is a prime power.
Lemma 2.
Let be a vector space of dimension over , where s be a positive integer. There are
subspaces
of of dimension s, called hyperplanes. Let be the additive group of and consider as subgroups of . Let G be an arbitrary abelian group containing as a central subgroup of index , and let
be coset representatives of in G. Then
is a McFarland difference set [20] in G, i.e,
Proof.
The difference set is comprised of subsets of , namely the hyperplanes together with the empty set.
Let be a nontrivial character of G and consider the character sum
(1) is nontrivial on and nontrivial on G;
(2) is trivial on and nontrivial on G;
From the above description, it is easy to judge from lemma 1(i) that such a construction produces a difference set.
Let
it is easy to know that the number of blocks in is , and . In fact,
It follows that is a symmetric 2- design on G. □
3.2. Access Structures from Semi-Regular Relative Difference Sets
Based on the properties of the above difference set, there is the following construction of semi-regular RDSs.
Lemma 3.
Let be a vector space of dimension over , where s be a positive integer. There are
subspaces
of of dimension s, called hyperplanes. Let G be an arbitrary abelian group containing as a central subgroup of index , and let
be coset representatives of in G. Then
is a semi-regular RDS in G relative to , i.e.,
Proof.
The RDS is comprised of subsets of , namely of the h hyperplanes.
(1) If a nontrivial character of is trivial on then each subset provides a contribution to the character sum modulus of 0,
(2) If a nontrivial character of is nontrivial on then one subset contributes and the rest contribute 0.
This gives the required character sum modulus for characters of G which are nontrivial on . For nontrivial characters of G which are trivial on , the required character sum modulus of 0 is again a consequence of the subset sizes.
From the above description, it is easy to judge from lemma 1(ii) that such a construction produces a RDS.
Let
it is easy to know that the number of blocks in is , and .
It follows that is a symmetric 2- design on G. □
4. Secret Sharing Scheme
4.1. Shamir Threshold Secret Sharing Scheme
Shamir threshold secret sharing scheme is mainly constructed by interpolation polynomial, and has one-to-one correspondence with RS code. threshold scheme is simple and satisfies linearity, so it is widely used.
Next, let’s briefly review the Shamir threshold secret sharing scheme
Shamir -threshold scheme
Let be the main key, and there is a set of n participants, where .
(1) Key distribution:
i. The key management center D secretly selects (uniformly and randomly) elements in and takes a polynomial in x as a variable
ii. D selects n different non-zero elements in and calculates the following
iii. D secretly distributes to participant .
(2) main key reconstruction:
Without losing generality, suppose that the participant set wants to reconstruct the main key s. Thus, they have a total of k point pairs:
Then, using the Lagreanger interpolation formula,
This allows them to calculate the main key:
Therefore, any k or more participants together can reconstruct the main key s, while less than k participants can get no information about s.
This is a method to recover the main key based on linear equations. For any k subkey, without loss of generality, denoted , where , . These k participants are able to obtain the following equations based on their mastery of the subkey set :
which is equivalent to
The above coefficient matrix has rank k, and its corresponding transpose matrix is a Vandermonde matrix,
Therefore, the unique solution of the equations containing k unknowns and k equations can be solved, so that the main key s can be recovered.
4.2. Construction of Secret Sharing Scheme Based on Given Access Structure
Let be n distinct elements of , where . For , the RS codes for vector is
It is easy to know that is a -linear MDS code, and its corresponding dual code is also an MDS code.
In fact, the generator matrix for is
In fact, the coefficient matrix of the threshold secret sharing scheme (after transposing) and the generator matrix of RS codes (the matrix composed of any k columns) are one-to-one corresponding.
Now, based on RS codes, we consider how to prevent some participants from cheating in the Shamir secret sharing scheme given the access structure.
Imagine l participants join forces, and m of them come up with forged subkeys. Can l participants find that any participant is cheating after joining forces? Furthermore, can they find out all m cheaters, point out the true subkeys of these cheaters, and work out the main keys?
Based on the access structure given in Section 3, the following results solve the above problems.
Theorem 1.
Consider a Shamir secret sharing scheme with a threshold of on G, where there are n participants, .
When , any l participants join forces, and if there are no more than cheaters, the l participants can detect someone cheating. If there are no more than cheaters, the l participants can identify all the cheaters, indicate the true subkeys of these cheaters, and calculate the main key.
Proof.
Let the l participants joining forces be , where . Consider the RS codes
Since linear code is an MDS code with code length l and dimension k, the minimum distance of is .
The key control center makes G and public, so after players joins forces, their is known. In addition, the code is known to l participants after l participants join forces.
Now let the control center adopt polynomial (), then the main key is , and is the codeword in , where is the subkey of players ().
If the l players join forces, each shows that their subkey is , but m or less of them are forged. In other words, the Hamming distance between code word and vector is less than or equal to m. According to error-correcting code theory, when , it can be determined by the vector whether there is a participant cheating. When vector is a codeword in , there is no cheating, otherwise someone will be found cheating. Furthermore, if , code can correct the error of , so the codeword can be recovered from vector , all participants of are cheaters, and the true subkey of should be . Since , the main key can be calculated by randomly taking t of these l players together with their real subkeys. □
Example 1.
Let , , then we can know that , . Let , take .
The key control center exposes and of 18 participants , and takes () to calculate
The control center sends the subkey to participants respectively, and the main key is . But the polynomial is kept secret from any participants.
Now let players
join forces, they each show their own key, forged the fake sub-key. Since , the deceiver can be identified based on the 15 players. The method is to consider RS code
The code length of the RS is , the dimension is , and the minimum distance is , which can correct 1 error. The subkey presented by 15 players together gives vector , which is 1 position different from the codeword in the code , so the codeword can be recovered from by the RS code . After the subkey of the deceiver is recovered, the main key can be calculated according to the formula.
Based on the access structure given by semi-regular RDSs in Section 3, the following secret sharing scheme is given.
Theorem 2.
Consider a Shamir secret sharing scheme with a threshold of on G, where there are n participants, .
When , any l participants join forces, and if there are no more than cheaters, the l participants can detect someone cheating. If there are no more than cheaters, the l participants can identify all the cheaters, indicate the true subkeys of these cheaters, and calculate the main key.
Proof.
The proof is similar to the proof of Theorem 1, which is omitted here. □
Remark 1.
For reference, we list some known constructions of perfect ideal linear schemes and our new constructions in Table 1. It should be emphasized that we mainly use difference sets to construct the corresponding access structures, which is different from other literature in Table 1 using codes to construct the access structures. In addition, it is easy to see from Table 1 that for a given access structure with field size, we give two effective explicit constructs of perfect ideal linear secret sharing schemes. Under some conditions, the scope of our field size is larger, which can make the secret sharing schemes with more participants exist, therefore, our schemes have greater potential practical value. In addition, the scheme we constructed involves fewer application levels, which is also our next research task.
Table 1.
Some known classes of perfect ideal linear secret sharing schemes with field size.
5. Conclusions
In this paper, we introduce a method for constructing access structures derived from hyperplane combinatorial structures over finite fields. For a given access structure, we present a corresponding secret sharing scheme designed to detect and identify cheaters. This scheme ensures that the secret can be accurately reconstructed as long as the number of cheaters does not surpass a predefined threshold, while also allowing for the detection and localization of any cheating activity.
Author Contributions
The idea of the manuscript was proposed by G.W. The main body of the manuscript was jointly written by G.W. and Y.C.; and Y.C. was also responsible for verifying the conclusion. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by The Talented Research Start-up Project of Jiaying University (No. 2022RC02) (Yucheng Chen); The 2024 Qinghai Province “Kunlun Talent-High-End Innovative and Entrepreneurial Talent” Cultivation Category Top-notch Talent Project (No. QHKLYC-GDCXCY-2024-216) (Guohui Wang).
Data Availability Statement
We did not cite any other data. All the data used are in the manuscript.
Acknowledgments
We are grateful to the anonymous referees for useful comments and suggestions that improved the presentation and quality of this paper.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the International Workshop on Managing Requirements Knowledge, New York, NY, USA, 4–7 June 1979; p. 313. [Google Scholar]
- Ben-Or, M.; Goldwasser, S.; Wigderson, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; Association for Computing Machinery: New York, NY, USA, 2019; pp. 351–371. [Google Scholar]
- Chaum, D.; Crépeau, C.; Damgard, I. Multiparty unconditionally secure protocols. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, 2–4 May 1988; pp. 11–19. [Google Scholar]
- Cramer, R.; Damgård, I.; Maurer, U. General secure multi-party computation from any linear secret-sharing scheme. In Advances in Cryptology—EUROCRYPT 2000, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Bruges, Belgium, 14–18 May 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 316–334. [Google Scholar]
- Cramer, R.; Daza, V.; Gracia, I.; Urroz, J.J.; Leander, G.; Martí-Farré, J.; Padró, C. On codes, matroids, and secure multiparty computation from linear secret-sharing schemes. IEEE Trans. Inf. Theory 2008, 54, 2644–2657. [Google Scholar] [CrossRef]
- Wang, Z.; Cheung, S.C.; Luo, Y. Information-theoretic secure multi-party computation with collusion deterrence. IEEE Trans. Inf. Forensics Secur. 2016, 12, 980–995. [Google Scholar] [CrossRef]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
- Naor, M.; Wool, A. Access control and signatures via quorum secret sharing. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, 14–15 March 1996; pp. 157–168. [Google Scholar]
- Desmedt, Y. Threshold cryptosystems. In Advances in Cryptology—AUSCRYPT’92, Proceedings of the International Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, QLD, Australia, 13–16 December 1992; Springer: Berlin/Heidelberg, Germany, 1993; pp. 1–14. [Google Scholar]
- Karchmer, M.; Wigderson, A. On span programs. In Proceedings of the Eigth Annual Structure in Complexity Theory Conference, San Diego, CA, USA, 18–21 May 1993; pp. 102–111. [Google Scholar]
- McEliece, R.J.; Sarwate, D.V. On sharing secrets and Reed-Solomon codes. Commun. ACM 1981, 24, 583–584. [Google Scholar] [CrossRef]
- Massey, J.L. Minimal codewords and secret sharing. In Proceedings of the 6th Joint Swedish-Russian International Workshop on Information Theory, Mölle, Sweden, 22–27 August 1993; pp. 276–279. [Google Scholar]
- Ito, M.; Saito, A.; Nishizeki, T. Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. (Part III Fundam. Electron. Sci.) 1989, 72, 56–64. [Google Scholar] [CrossRef]
- Tang, C.; Gao, S.; Zhang, C. The optimal linear secret sharing scheme for any given access structure. J. Syst. Sci. Complex. 2013, 26, 634–649. [Google Scholar] [CrossRef]
- Harn, L.; Hsu, C.; Zhang, M.; He, T.; Zhang, M. Realizing secret sharing with general access structure. Inf. Sci. 2016, 367, 209–220. [Google Scholar] [CrossRef]
- Ma, S.L.; Schmidt, B. Difference sets corresponding to a class of symmetric designs. Des. Codes Cryptogr. 1997, 10, 223–236. [Google Scholar] [CrossRef]
- Jungnickel, D. On automorphism groups of divisible designs. Can. J. Math. 1982, 34, 257–297. [Google Scholar] [CrossRef]
- Turyn, R. Character sums and difference sets. Pac. J. Math. 1965, 15, 319–346. [Google Scholar] [CrossRef]
- McFarl, R.L. A family of difference sets in non-cyclic groups. J. Comb. Theory Ser. A 1973, 15, 1–10. [Google Scholar] [CrossRef]
- Tassa, T.; Dyn, N. Multipartite secret sharing by bivariate interpolation. J. Cryptol. 2009, 22, 227–258. [Google Scholar] [CrossRef]
- Farras, O.; Padró, C.; Xing, C.; Yang, A. Natural generalizations of threshold secret sharing. IEEE Trans. Inf. Theory 2014, 60, 1652–1664. [Google Scholar] [CrossRef]
- Chen, Q.; Tang, C.; Lin, Z. Efficient explicit constructions of compartmented secret sharing schemes. Des. Codes Cryptogr. 2019, 87, 2913–2940. [Google Scholar] [CrossRef]
- Chen, Q.; Tang, C.; Lin, Z. Efficient explicit constructions of multipartite secret sharing schemes. IEEE Trans. Inf. Theory 2021, 68, 601–631. [Google Scholar] [CrossRef]
- Brickell, E.F. Some ideal secret sharing schemes. In Advances in Cryptology—EUROCRYPT’89, Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, 10–13 April 1989; Springer: Berlin/Heidelberg, Germany, 1990; pp. 468–475. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).