IoT-Applicable Generalized Frameproof Combinatorial Designs

: Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efﬁcient data transfer in sensor-based IoTs is built using ramp-type schemes. Protecting personal privacy and reinforcing the security of electronic identiﬁcation (eID) cards can be achieved using similar schemes. Desmedt et al. introduced the concept of frameproofness in 2021, which motivated us to further improve our construction with respect to this framework. We introduce a graph theoretic approach to the design for a well-rounded and easy presentation of the idea and clarity of our results. We also highlight the importance of secret sharing schemes for IoT applications, as they distribute the secret amongst several devices. Secret sharing schemes offer superior security in lightweight IoT compared to symmetric key encryption or AE schemes because they do not disclose the entire secret to a single device, but rather distribute it among several devices.


Introduction
The Internet of Things (IoT) is a rapidly growing network of interconnected devices that communicate with each other to perform various tasks.As the number of IoT devices increases, so does the need for secure communication between them.Cryptography is an essential tool for securing IoT devices, and secret sharing schemes are one of the most promising cryptographic elements for IoT.For example, the Datachest application encrypts and stores sensitive data in commercial cloud storage systems using secret sharing [1].The application uploads the data in encrypted form, and cryptographic keys are divided into shares.Each cloud receives one share, and this solution improves the security of users' sensitive data in the cloud.In this paper, we identify the importance of applicability of secret sharing schemes to IoT, and pay particular attention to the value our proposed distribution design may introduce through frameproofness of the underlying scheme in such applications as well as possibilities for integrating multiple or multi-level systems without complete loss of distinction of the underlying individual systems.
A secret sharing scheme is a useful tool in modern cryptography.They are distinctive in distributing a secret amongst multiple devices, ensuring that no single device has access to the entire secret.This makes secret sharing schemes ideal for IoT applications where multiple devices need to work together to perform a task.For example, in a smart home system, multiple devices such as sensors, cameras, and smart locks need to communicate with each other to provide security and convenience to the homeowner.In secret sharing-based IoT (SBIoT), each cloud server is given a share constructed using a secret sharing scheme.A collection of servers can reconstruct the secret provided that they satisfy the reconstruction criteria of the underlying scheme (instead of privately owned keys in encryption-based schemes).Such a scheme enables processing without the need of decryption.Energy efficiency refers to the total energy consumption of an IoT network, which affects the lifetime of a network [2].It is well-known that use of a ramp-type scheme improves the security and energy efficiency in SBIoT networks [3].It provides better security against various types of attacks, including replay attack, modification attack, selective forwarding attack, and data leakages when a passive attacker is encountered.These benefits contribute to enhancing the overall security and performance of data transfer in SBIoT networks.Using a threshold scheme enhances personal information protection for eID cards by not storing any personal information per se in the card [4].Instead, sensitive personal information is divided into two parts for distributed storage in the client and the eID card.This ensures safety even when eID cards are lost because none of the original information can be figured out from a single secret share.With this structure, no information whatsoever on the original can be known from only the secret share in the card.
Consider b players and a positive integer τ ≤ b.Suppose a dealer distributes a secret to these b players such that any collection of τ players can reconstruct the secret with their shares, but no smaller collection of players can do so.This is called a (τ, b)-threshold secret sharing scheme with threshold τ.If the dealer distributes shares to b players such that any collection of τ 1 players can reconstruct the secret but no collection of τ 2 or less players can do so (for τ 2 < τ 1 ≤ b), then it is called a (τ 1 , τ 2 , b)-ramp scheme.Thus, if τ 1 − τ 2 = 1, then it is a (τ 1 , b)-threshold scheme.In this paper, we shall present a repairable ramp scheme, which we call a tensor design.
Secret sharing schemes also play a crucial role in ensuring secure data storage within cloud environments.These schemes involve the division of data into multiple shares, which are then stored on different servers.This approach provides a safeguard against any potential compromise of a single server, thereby maintaining the security of the data.In [5], the authors present an exploration of the comparative performance of Shamir's secret sharing algorithm [6] and Rabin's IDA [7] within a private cloud framework utilizing the OpenStack cloud infrastructure.The experimental results indicated that Shamir's secret sharing algorithm outperformed Rabin's IDA in terms of generating the shares and reconstructing the data.However, Rabin's IDA exhibited a lower storage overhead when compared to Shamir's secret sharing algorithm.These findings underscore the importance of considering various factors, such as generation time, reconstruction time, and storage requirements, when selecting an appropriate secret sharing scheme for secure data storage in cloud environments.
In their 2019 work, Stinson and Kacsmar [8] demonstrated non-ideal secret sharing schemes stemming from an ideal scheme (viz.Shamir scheme) as the base scheme.They presented a distribution design which was a threshold scheme with the ability to repair lost shares with a certain probability, and secure against any adversary with lesser players than the threshold.Our work further generalizes the domain over which our distribution designs are defined, in addition to providing it with easier secret reconstruction and share repairability, and securing it in more than one context.In short, we revisit the combinatorial design and some of its key properties first.

Combinatorial RTS
Consider the problem of securely reconstructing the lost share of a player by that player and a subset of the other players.A combinatorial solution to this problem was proposed by Stinson and Wei [9].These schemes are termed combinatorial RTS.A repairable threshold scheme (RTS) is a (τ, b)-threshold scheme in which a subset of players can repair another player's share in the event that their share is lost or corrupted, without the participation of the dealer who set up the scheme.The repairing protocol should not compromise the (unconditional) security of the threshold scheme.

A Drawback and an Idea of Extension
The combinatorial model proposed so far produces shares that are in a finite field F k q .Whether we can extend this notion to an integer ring is the first question.In this work, we propose a method to construct a distribution design with entries from an integer ring, thus generalizing the domain.We further show that this is a ramp scheme and consequently give a method of secret reconstruction for it, which is significantly easier in comparison to [8].The size of the authorized coalition that can recover the secret is significantly reduced in our framework.Example 3 will demonstrate the fact.

Repairability Problem
Techniques from network reliability theory are heavily used in reliability studies of these combinatorial repairable threshold schemes in a setting where players may not be available to take part in the repair of a given player's share.Reference [8] deals with the problem of reliability of such schemes and reconstruction of secrets and repairing shares without participation of the dealer.
The scheme proposed in this paper produces a far more efficient share repairability, which is possible due to the generalized domain, and based heavily on the easier secret reconstruction mentioned beforehand.

Frameproofness
Moving forward with the concept of repairing shares, another similar possibility was recently explored, called framing.Instead of simply specifying the minimum size of a set of players that can access the secret, suppose the dealer defines the share distribution through some other process.Say f : P → {0, 1} (where P denotes the power set of the set of all players P) such that any coalition of players A ⊆ P can access the secret if and only if f (A) = 1 (thus, in a Shamir scheme, f (A) = 1 if and only if |A| ≥ τ).If A ⊆ P maps to 1 through f , then A is called an authorized coalition; if it maps to 0, then A is an unauthorized coalition.
Given such an access structure over a secret sharing scheme, suppose a coalition A of players can gain information about the share of a player P ∈ P \ A dishonestly.Then A can wrongly accuse P of releasing information about the secret that only A is not authorized to access, i.e., A can frame P. Framing a player (or players) evidently undermines the security of any secret sharing scheme, as it allows a group of players to access extra information about the secret illegally.Thus, it is imperative to limit such capabilities and/or size of any such coalition when constructing a combinatorial RTS.The concept of frameproofness was examined by Desmedt et al. in their recent paper [10].In this paper, we improve the extension scheme so that no framing is possible for any coalition of smaller size than the threshold.The question of what can be the minimum size of a coalition that can frame a player under this modification currently remains open.

Results
In this paper, we first introduce an operation, the Krönecker product of two matrices, extendable to a Krönecker product of two BIBDs.Following up with some properties of this operation, we present methods to solve two inherent problems with Krönecker products; firstly, the operation does not produce a BIBD from two BIBDs, and secondly, we resolve the issue of uniqueness that arises with the introduction of this operation.Our next theorem deals with the existence of secret reconstruction, which we prove by producing an algorithm.A probabilistic proof is given next.
An immediate consequence of our results on the new scheme is its extendability to multiple BIBDs.We discuss it briefly though a dealer's algorithm.We proceed with an example to illustrate our algorithms further.We make considerable improvements on the method of share repair described in [8] for our proposed Krönecker product-induced BIBDs.
Next, we explore the concept of frameproofness for our proposed model and improve it significantly through certain changes in the model.We also prove existence of frameproofness of the modified scheme through results based on matchings of bipartite graphs.
Finally, we note the importance of secret sharing schemes in varied IoT applications, especially for their lightweight functionality, uniquely encapsulated through the nonaccessibility of the full secret to any single entity, which we strengthen by frameproofness and can expand by incorporating multiple systems by our Krönecker product.

Organization of the Paper
Our paper starts with a brief review of the work performed by Stinson and Wei [9] in Section 3. We then move on to describe our construction, beginning with an introduction of the Krönecker product of two BIBDs in Section 4. We describe the secret reconstruction procedure for such an object illustrated through an example in Section 5. Next, we briefly describe the method of share repair and compute the corresponding repair probabilities, much like in [8], in Section 6.We then proceed to modify this scheme to give a frameproof construction in Section 7. Furthermore, we answer the question of existence of such a modified construction in Section 8. Finally, we draw the reader's attention to the applicability of our results to secret sharing applications on the Internet of Things, especially in a secure, lightweight context, in Section 9.

Stinson and Wei's Model [9]
The classical Shamir scheme is defined over a finite field F q (q ≥ b + 1).It involves the following: • an initialization phase, in which the dealer chooses distinct, non-zero public elements x 1 , x 2 , . . . ,x b from F q , and gives value x i to player P i ; • a share distribution phase in which the dealer chooses a secret K = a 0 ∈ F q , then secretly chooses a 1 , . . ., a τ−1 ∈ F q independently and uniformly at random, and finally computes the share y i = a(x i ) where a(x) := τ−1 ∑ j=0 a j x j and gives it to player P i .
The combinatorial solution proposed by Stinson and Wei [9] to the share repairability problem is based on an old technique by Benaloh and Leichter, namely, giving each player a subset of shares from an underlying threshold scheme called a base scheme (which is, say, a (σ, m)-Shamir scheme over the base field F q ).Each player is then given a certain subset of d of the m shares, by use of a set system (or design) consisting of b blocks of size d, defined on a set of m points.This design is termed the distribution design: The resulting expanded (τ, b)-threshold scheme consists of each player P i corresponding to a block B i ∈ B of the distribution design.For each point x ∈ B i , the player P i is given the subshare s x .If X denotes the set of m points on which the design is defined and B = {B 1 , . . ., B b } is the set of all blocks, then this forms an (X, B)-distribution design.
each block B ∈ B contains exactly k points; 3.
every pair of distinct points from X is contained in exactly λ blocks.
Observe that if each point occurs in exactly r blocks, then the parameters b, v, k, r, λ of a BIBD satisfy the following relations [11]: Definition 2. We shall call a distribution design a tensor design if it simply satisfies property (i) above.

Design Properties
Next, we consider an example to demonstrate the fact that the object constructed in Section 4 is in fact a ramp scheme.For the purpose of computations, we recall some results from [8] on block designs.
k−1 blocks.The value r is termed the replication number of the scheme.

Tensor Design Generated by Two BIBDs
Given two matrices A and B, the usual matrix product operation can be carried out only when the column size of the left matrix A is equal to the row size of the right matrix B. The Krönecker product can be applied on any two matrices, irrespective of their dimension.This operation has several applications in Linear Algebra, of which, we consider some properties that shall be useful for working with BIBDs.

Definition of the Krönecker Product
The Krönecker product of two matrices A b 1 ×k 1 and B b 2 ×k 2 is the block matrix where a ij denotes the entry in the ith row and jth column of A.
Observe that Krönecker products follow the associative property.Thus, for matrices A, B, and C, Another interesting property of Krönecker products is that they maintain structure over block matrices.Thus, if A is written as a block matrix

Krönecker Product of Two BIBDs
Let A and B be the share matrices generated by ramp schemes with, respectively, b and b 2 blocks having shares of sizes k 1 and k 2 .Suppose A and B also denote the b 1 × k and b 2 × k 2 matrices corresponding to the two schemes.The Krönecker product of A ⊗ B is therefore where If the share matrix A is defined over the field F p 1 and B over the field F p 2 for some primes p 1 and p 2 , then we define the scalar multiplication by simple integer multiplication: The reason behind taking such a multiplication is that the product elements are not distinguishable from integers.Therefore, M is a matrix over the integer ring Z.
At this point, the first observation that we make is that the Krönecker product A ⊗ B of two BIBDs A and B does not always produce a BIBD.To illustrate the fact, we start with a small example, and then we describe a method for resolving this issue.Also, the Krönecker product in general does not produce an injective mapping from M b 1 ×k 1 × M b 2 ×k 2 to the matrix space M b 1 b 2 ×k 1 k 2 .So it is hopeless to search for a secret reconstruction procedure from a given Krönecker product matrix.We shall thus impose a condition producing an injective map and in turn, ensuring the existence of secret reconstruction.
Consider an example of two 2 − (4, 3, 2) Shamir schemes in F 5 and F 7 over the points {1, 2, 3, 4} and {1, 2, 3, 5} constructed using two polynomials modulo F 5 and F 7 , respectively.These can be represented by share matrices A and B, respectively, with r 1 = r 2 = 3: The Krönecker product of the BIBDs A and B is as follows: Hence, A ⊗ B has the parameters b = 16, v = 12, and k = 9; the parameters r and λ are not well-defined.Obviously, neither does this satisfy property 3 of a BIBD (Definition 1), nor the relation (i) of a tensor design (Definition 2).Lemmas 1-3 and Theorem 3 ensure that we always obtain a tensor design from a Krönecker product, and furthermore that we always obtain a secret reconstruction for such a share distribution scheme.

Some Results on the Krönecker Product of BIBDs
We now resolve these issues by defining some properties of a tensor design.Let A and B be share matrices defined on points {x 1 , x 2 , . . ., x n } and {y 1 , y 2 , . . ., y m }, respectively.Let B d be the same distribution scheme as B, but on the points {y 1 + d, y 2 + d, . . ., y m + d}.The position of an element in the Krönecker product of these two matrices can be found by simple counting, and is stated in the following lemma: Lemma 1.The product of a ij ∈ A and b kl ∈ B can be found in the row (i − 1)b 2 + k (which is also the player number in the repair scheme represented by M), and the column (j − 1)k 2 + l of M.
The next result helps ensure that A ⊗ B is indeed a BIBD: Lemma 2. Let {x 1 , x 2 , . . ., x n } and {y 1 , y 2 , . . ., y m } be two collections of integers.Then there exists an integer d such that {x 1 , x 2 , . . ., x n } and {y 1 + d, y 2 + d, . . ., y m + d} have no multiplicative collisions of the type x i y j = x k y l for (i, j) = (k, l).

Proof. Set d ≥ max
i,k∈{1,2,...,n} j,l∈{1,2,...,m} Proof.Without loss of generality, we may assume . ., y m ) and fix i < j in {1, 2, . . ., m}.Thus, y i = lk i and y j = lk j such that k i < k j .Choose d such that gcd( d, l) = 1 and gcd( d The matrix A ⊗ B d produces a tensor design (over the integer ring Z) for a (public) integer d such that there are no multiplicative collisions of the type x i (y if gcd(y 1 , y 2 , . . ., y v 2 ) = 1; then A and B can be reproduced from a collection of players in the new scheme A ⊗ B d , hence enabling share repair and secret reconstruction.This theorem can be generalized for finitely many such Krönecker products, and motivates us to present the following algorithm for a share distribution scheme.

Proof. The parameters of the Krönecker product
Part 1 of the theorem therefore follows from Lemma 2, which ensures a well-defined value for r, and Lemma 3, which ensures a well-defined value for λ.
In order to prove part 2, we describe two ways to reproduce A and B. Recall first that any τ 1 rows of A produce all points of A, and similarly τ 2 rows for B d .Furthermore, we claim the following: τ 2 players from one row-block T i of M; (ii) at least one player from distinct τ 1 − 1 row-blocks T j = T i of the remaining b 1 − 1 row-blocks can reconstruct the secret.
A collection of players that contains (i) τ 1 players from one S j ; (ii) at least one player from τ 2 − 1 S i , i = j can also reconstruct the secret.
We now present an algorithm to prove claim [I]; claim [II] follows similarly.

3.
Construct the complete matrix B d using the shares of τ 2 players of B d that are now known.Hence construct B.

4.
Using the values of the elements in B d , compute the values a i 1 , a i 2 , . . ., a i k 1 for τ 1 − 1 indices i that are distinct from each other as well as from i.

5.
Hence, construct A from the shares of τ 1 players of A thus obtained.6.
Finally compute the secret from A and B.
This reconstruction algorithm is clearly better than the one in [8] in the sense that the size of the authorized coalition is smaller.In fact, the size of the authorized coalition, while not unique, has a lower bound in the number of players.The following section provides a proof that there is always a secret reconstruction for this scheme.

Proof of Existence of Secret Reconstruction
Let us redefine the problem in terms of random variables.Let X 1 , X 2 , . . ., X n be sampled without replacement from the collection of all players.We assume a uniform probability distribution over the set of all players.
Let E 1 be the event that condition [I] is satisfied and E 2 be the event that condition [II] is satisfied.Also, let D(n 0 ) be the event that n ≥ n 0 .We find an n 0 such that Pr Proof.We observe that E 1 (i) c is the event max n k < τ 2 and E 1 (ii) c is the event that n k ≥ 1 for at most τ 1 − 1 indices k.Thus, if there are (τ 1 − 1)(τ 2 − 1) + 1 players in a collection, then by the pigeonhole principle, either Proof.We observe that E 1 (i) c is the event max n k < τ 2 and there are b 1 n k s.Thus, if there are (τ 2 − 1)b 1 + 1 players in a collection, then by the pigeonhole principle, E 1 (i) c is violated, since there is at least one n k with τ 2 or more players.
Proof.We observe that E 1 (ii) c is the event that n k ≥ 1 for at most τ 1 − 1 indices k.By definition, each n k can have at most b 2 elements.Thus, any collection of (τ Proof.We observe that E 2 (i) c is the event max r j < τ 1 and E 2 (ii) c is the event that r j ≥ 1 for at most τ 2 − 1 indices j.Thus, if there are (τ 1 − 1)(τ 2 − 1) + 1 players in a collection, then by the pigeonhole principle, either E 2 (i) c or E 2 (ii) c is violated.
Proof.We observe that E 2 (i) c is the event max r j < τ 1 and there are b 2 r j s.Thus, if there are (τ 1 − 1)b 2 + 1 players in a collection, then by the pigeonhole principle, E 2 (i) c is violated, since there is at least one r j with τ 1 or more players.
Proof.We observe that E 2 (ii) c is the event that r j ≥ 1 for at most τ 2 − 1 indices j.By definition, each r j can have at most b 1 elements.Thus, any collection of (τ 2 − 1)b 1 + 1 players violates E 2 (ii) c . For Note that the bound given here for the reconstruction number is tight, as we might expect.In the example presented in Section 5, the bound turns out to be 5, which matches all the bounds above.Corresponding counterexamples can be constructed to show that no smaller-sized general collection can complete the reconstruction.This result can be generalized for three or more designs.These results provide us with the tools to present a generalized scheme, which we do now.

2.
Dealer finds an integer d 1 such that gcd( For i ∈ {2, . . ., n}: • Dealer finds an integer d i (using Lemmas 2 and 3) such that d i breaks all pairwise multiplicative collisions and makes the gcd of all elements Dealer distributes each row i of M as share to player P i and outputs (d 1 , d 2 , . . ., d n ) publicly.
Note that by Theorem 3, M is a tensor design, and the algorithm in the proof of the theorem can be generalized for secret reconstruction of this scheme.

Example
Recall the previous example (5).Using the algorithm in Section 4.5, we produce a tensor design A ⊗ B 21 using an integer d = 21 satisfying Lemma 3. Representing the share matrix modified from B by B 21 (and noting that both share matrices are undeclared), with r 1 = r 2 = 3:   7), and is a secret sharing scheme with reconstruction number 2. A secret reconstruction algorithm for this scheme is detailed in Section 5.1.

Secret Reconstruction
The matrix A ⊗ B 21 in the above example produces interesting results.1.
A collection of three players-exactly two from one of the sets T 1 , T 2 .T 3 , T 4 and one from another-allows reconstruction of the secret.For example, consider the set of three players {P 1 , P 2 , P 5 }.This set can reconstruct the secret: (i) gcd(22, 23, 24, 23, 24, 26) = 1; hence, the first row of M A is (1 2 3) and the first two rows of M B are (22 23 24) and (23 24 26).As τ 2 = 2, M B can be obtained from its two rows.(ii) Now, observing 5 = 4 • 1 + 1, we readily know P 5 uses the first row of M B and the second row of M A ; this yields the second row of M A , (2 1 4).Since τ 1 = 2 and we have two rows of M A , the whole matrix M A is known.2.
Any collection of three players-two from one of the sets S 1 , S 2 , S 3 , S 4 and one from another-also allows reconstruction of the secret.

3.
Reconstruction of the secret is ensured for a collection of five or more players.
This idea can be generalized to a secret reconstruction algorithm in the general case.

Share Repair for a Krönecker Product-Induced Distribution Design
Let A and B be (v 1 , k 1 , 1)-and (v 2 , k 2 , 1)-BIBDs with b 1 and b 2 blocks, and replication numbers r 1 and r 2 , respectively.Consider player P 1 , whose share is the first block (i.e., row) of A ⊗ B. Thus, Using the notations and method described in [8] (and making the same assumption that any player is available with a fixed probability p), the probability of availability of at least one repair set is We improve this method significantly.For this, observe that each block L k (k ∈ {1, 2, . . ., k 1 }) (possibly with a different factor a mi for some m ∈ {1, 2, . . . . . ., b 1 }, i ∈ {1, 2, . . ., k 1 }, from A) occurs in the shares of r 1 − 1 players other than P 1 .( 9) Furthermore, the share of P 1 can also be characterized as It is thus clear that each K j (j ∈ {1, 2, . . ., k 2 }) (possibly with a different factor b lj for some l ∈ {1, 2, . . ., b 2 }, from B) occurs in the shares of r 2 − 1 players other than P 1 .
Let us assume that we have t 1 players of type ( 9) and t 2 players of type (10).Then where (i) t 1 are selected from type ( 9); (ii) t 2 are selected from type (10); (iii) ) are selected independently, and . Therefore, the probability of at least one repair set being available in this case is Let E * (p) be the expected number of minimal repair sets.In general, this expected number is the product of the total number of possible repair sets and the probability of availability of each repair set.Ref.
[8] sets E(p) = (r 1 r 2 ) k 1 k 2 .We denote by C(t 1 , t 2 ), the number of partitions of a set of size k 1 k 2 into three sets of sizes t 1 , t 2 and k 1 k 2 − t 1 − t 2 .By an argument similar to the previous, Hence, Table 1 shows a comparison of share repair probability on three projective plains for two different methods. (1 (1 − q 8 ) 9 > (1 − q 4 ) 9 + . . .

Consider matrix representations of two BIBDs
, and their Krönecker product as depicted in Equation (4).We show here how the share of a player, say P 1 , can be retrieved (i.e., player P 1 can be framed; see [10] for more details) by only two other players.For clarity, we mention here that the share of P , . .., then they could construct the entire share of P 1 .

2.
Note that for j = 1, any of the b 2 − 1 players with shares Therefore, only two players -one from the r 1 − 1 players possessing a 11 b 11 and one from the b 2 − 1 players possessing a 12 a 11 , a 13 a 11 , . . .-can reconstruct the entire share of player P 1 , and hence, frame this player.
We try to address this problem by reducing the repetitive nature of shares of the participants.We shall do this by decreasing the size of each share, while retaining all the information that a player had in the previous construction (i.e., Equation (4)).

A Modified Scheme
Given two matrices A and B of the same dimension r × c, we define the operation A B as the r × c matrix generated by position-wise products of elements of A and B, i.e., The operator is well-behaved in the sense that it is commutative and respects scalar multiplication on integer-valued matrices.
Next, we represent application of the function πl to the m th block matrix (of size b 2 × k 2 ) of block-row t in A ⊗ B by θ mt = l, and define matrix where n ij is the element in the ith row and jth column of the (m, t)th block matrix of M. Finally, the ith row of matrix (A ⊗ B) N produces the share of player P i (i ∈ {1, 2, . . ., b 1 b 2 }) by omitting the zeroes.

Example
Consider another example, where a 2 − (4, 3, 2)-BIBD and a 2 − (5, 4, 3)-BIBD over the points {1, 2, 3, 4} and {22, 23, 24, 25, 26} are represented by matrices A and B, respectively (note that r 1 = 3, r 2 = 4): Modifying the matrix in Figure 2, as shown in Figures 3 and 4, we obtain a scheme for which it is no longer possible to reconstruct the secret of the scheme in Figure 4 from just two players (as was possible in the example in Section 5).In fact, the proceeding section provides an algorithm for secret reconstruction from this scheme using τ  12), and is a secret sharing scheme with reconstruction number 2.

3.
Construct set S y := l : πl ( î) = ĵ ∧ b î ĵ = y .By Theorem 6, for a maximal set S y (if not, then another value y may be chosen by selecting a different element a m t b i j ) the set a mt : a mt b î ĵ ∈ the share of player P m î such that b î ĵ = y = {x 1 , x 2 , . . ., x v 1 } is the set of all values in A.

4.
Construct matrix A, since the positions of all values x 1 , x 2 , . . ., x v 1 in this matrix are now known.

5.
Compute b i j for a m t b i j ∈ share of player P m i using the known values a m t until all values y 1 , y 2 , . . ., y v 2 are known.6.
Construct matrix B, since the positions of all values y 1 , y 2 , . . ., y v 2 in this matrix are now known.7.
Compute A ⊗ B from the two known matrices.
Thus, framing any player is not possible for just two other participants, and requires a much larger coalition.

Graphical Representation and Proof of Existence of Permutations Matching in Bipartite Graphs
Given an undirected graph G, a matching of G is a subgraph M containing all vertices of G such that each vertex in M has either 0 or 1 edge incident to it.M is a maximal matching of G if it is not a subgraph of any other matching of G. Thus, adding even one more edge to a maximal matching M ensures that it is no longer a matching.The number of edges in a maximal matching of G is called the matching number of G.
A perfect matching M of G is such that each vertex of M has an edge incident to it.Furthermore, a vertex cover of a graph G is a subgraph containing all edges of G such that every edge is incident to at least one vertex in the subgraph, and an edge cover of a graph G is a subgraph containing all vertices of G such that every vertex has at least one edge incident to it.Thus, if G has no isolated vertices, then the sum of the number of vertices in its minimal vertex cover and the number of edges in its minimal edge cover equals the total number of its vertices.
If the vertex set V of a graph G can be partitioned into two disjoint subsets as V = A B such that any edge from a vertex in A can only be incident to a vertex in B and vice versa, then G is called a bipartite graph.Let us recall some interesting results on matching in bipartite graphs.
Theorem 4 (König,[12]).In any bipartite graph, the number of edges in a maximum matching equals the number of vertices in a minimum vertex cover.
Theorem 6.Given a bipartite graph G inducing a tensor design B, and given subsets δ(P i ) ⊆ N(P i ) of size s, (i) If i∈[b] δ(P i ) = V, then reconstruction of the modified scheme (A ⊗ B) modified is possible.
Proof.Assuming the usual notations for a tensor design, it is clear that in G, From Equation ( 13) and the inclusion-exclusion principle, Since r ≥ λ, Hall's theorem (Theorem 5) implies G has a matching of size v, i.e., i∈[b] δ(P i ) = V.Thus, (i) holds by the reconstruction algorithm in Section 7.3.Now choose δ(P i ) such that each subset contains at least one point matched with P i in this matching, so that (ii) holds.This proves the theorem.

Secret Sharing Schemes and the Internet of Things
Secret sharing schemes can be used to distribute the security key amongst numerous devices in an IoT system, ensuring that no single device has access to the entire key.They are also lightweight and require less computational power compared to other cryptographic elements.Additionally, their ability to detect and prevent attacks that attempt to modify or delete parts of the secret is particularly important in IoT applications where security is critical.
For example, in a healthcare IoT system, the security of patient data is of utmost importance.Secret sharing schemes can be used to distribute the patient data amongst multiple devices, ensuring that no single device has access to the entire data.Ref. [14] proposes an AI heuristic decision algorithm, utilizing a best-first search (BFS) approach.It effectively balances energy load and reduces communication overhead in smart healthcare technologies.The utilization of homomorphic secret sharing in IoT-based e-health applications provides various advantages in terms of privacy and security.It securely distributes secret pairs among medical nodes, ensuring the confidentiality of sensitive health data during transmission and storage within the network.This is achieved by encrypting data through homomorphic secret sharing, thereby preventing unauthorized access to medical data.Access to medical records is limited to authorized entities possessing the necessary secret keys to decrypt and utilize the shared data.Thus, the incorporation of homomorphic secret sharing adds an extra layer of protection against unauthorized modifications or alterations to medical records.A generalization of this scheme to multiple levels-possibly to combine data between different hospitals or chains of healthcare providers, different states within a country, or even different countries-can be easily achieved through the Krönecker product of the individual schemes used by each hospital system.The fields on which these schemes are based provide a perfect foundation for the homomorphism, which can be easily maintained by the integer ring over which the Krönecker product is then defined.
A frameproof tensor product of multiple distribution designs can be distinctly useful for lightweight IoT applications, as it allows for a multi-level or multi-system secret sharing scheme IoT implementation in a secure and efficient manner, while detecting and preventing any attempt to modify or delete parts of the secret data.This approach ensures that even if some levels are compromised, the overall security of the system(s) remains intact.
The wide range of applicability of our generalizations can be further seen in, say, the management of massive data, such as [15], which proposes a non-interactive approach for IoT data aggregation that utilizes additive secret sharing, addressing numerous challenges including privacy concerns, security risks, high communication overhead, and user interaction.The additive secret sharing effectively masks the original data, preventing malicious analysis by the servers.The scheme also supports offline mobile users, maintains privacy, and provides efficient algorithms for result verification.However, ref. [15] only splits the secret between two servers at a time.A frameproof tensor product can be smoothly applied in this context for connecting a large number of such systems, due to the underlying fields over which the secrets are split between servers in individual systems, as well as the generalized integer ring over which the tensor product is then defined.
Figure 6 shows an application of tensor design in multi-system IoT.

+ =
data breach Figure 6.An application of the tensor product of repairable threshold schemes in multi-system IoT, where each system (say, a single hospital) may possess a separate RTS for sharing its own secret key, while multiple systems (say, a chain of hospitals) may share their individual secrets to non-colluding cloud storage providers through a tensor product of the individual schemes.

Conclusions and Future Work
In this paper, we have first generalized the concept of combinatorial RTS and then improved our secret sharing scheme by producing a frameproof one.We believe our results can be extended further to an arbitrary number of distribution designs.We also believe that the Krönecker product of BIBDs can be generalized to t-designs, and all corresponding results will hold for these.Furthermore, a frameproof modification for the generalized scheme also remains an open problem.
Furthermore, we have discussed the extensive scope of applicability for our proposed scheme in a diverse array of IoT contexts.A fascinating avenue for further investigation entails the examination of specific instances of these applications.
otherwise.We further define n k = n ∑ i=1 J i,k and r j = n ∑ i=1 I i,j .Then the condition for reconstruction becomes [I] b 1 = 4, b 2 = 4, k 1 = 3,and k 2 = 3. Observe that τ 1 = 2 and τ 2 = 2 are the reconstruction numbers of A and B, respectively.The Krönecker product of the two matrices A and B 21 , represented by the matrix M, is shown in Figure1.

Figure 1 .
Figure 1.The matrix A ⊗ B 21 is the Krönecker product of A and B 21 as in Equation (7), and is a secret sharing scheme with reconstruction number 2. A secret reconstruction algorithm for this scheme is detailed in Section 5.1.

Figure 3 .
Figure 3.The matrix N, right-operated as N on the tensor design A ⊗ B in Figure 2

Figure 4 .
Figure 4.The matrix on the left is (A ⊗ B) N, and the one on the right is the share distribution scheme obtained from this operation, as described in Section 7.1.7.3.Secret Reconstruction for the Modified Scheme1.Choose a player P m i (which is the ith player in the mth row-block of A ⊗ B, or the ((m − 1)b 2 + i)th player from the top), for any m ∈ {1, 2, . . ., b 1 } and i ∈ {1, 2, . . ., b 2 }.2.Consider elements a mt b ij in the share of player P m i , i.e., θ mt = l and πl (i) = j.For such an element a mt b ij , set y = b ij (note that the value y ∈ {y 1 , y 2 , . . ., y v 2 } is not known, but the positions at which the matrix B contains elements b î ĵ = y is known).
Given a bipartite graph G = (V, E ) with V = A B, G has a matching of size |A| if and only if for every S ⊆ A we have |N(S)| ≥ |S|, where N(S) = {b ∈ B : ∃ a ∈ S with (a, b) ∈ E }.

Table 1 .
A comparison table showing probability of share repairability on three projective planes.
The matrix A ⊗ B is the Krönecker product of A and B as in Equation (