Uniformly robust threshold secret sharing scheme with maximum threshold and reduced complexity of share computation and secret reconstruction
DOI:
https://doi.org/10.30837/rt.2026.1.224.03Keywords:
cybersecurity, cyberattack, cryptographic information protection, threshold secret sharing scheme, uniform robustness, unconditional security, reduction of time complexityAbstract
A secret sharing scheme is a cryptographic protocol that enables a secret to be distributed among a prescribed set of participants in such a way that only certain (authorized) coalitions of participants are able to reconstruct the value of the secret by combining their components (shares of the secret). The collection of all authorized coalitions of participants is referred to as the access structure of the given secret sharing scheme. A scheme is called threshold if its access structure consists of all coalitions whose cardinality is bounded below by a fixed number, called the threshold.
This paper is devoted to the construction of a uniformly robust perfect threshold secret sharing scheme with the maximum threshold (equal to the number of participants), which is characterized by lower time complexity of share computation and secret reconstruction compared to a previously known analogous scheme. The robustness of a scheme means its unconditional security against attacks by dishonest participants who may substitute their own shares in order to distort the value of the secret during reconstruction. A secret sharing scheme is called uniformly robust if it remains secure against this attack regardless of the method used to select the set of secret keys from the collection of all elements that can potentially be distributed.
Interest in such secret sharing schemes is primarily motivated by the possibility of constructing perfect schemes for arbitrary access structures on their basis, which is acceptable for practical applications provided that each participant belongs to a not excessively large number of minimal authorized coalitions.
It is shown that the proposed secret sharing scheme is not inferior to the previously known one with respect to any efficiency metric, while significantly outperforming it in terms of the complexity of the secret sharing and reconstruction procedures. The proposed scheme is constructed on the basis of a random maximum-distance separable (MDS) code, which differs from the Reed–Solomon code underlying the construction of the previously known scheme. This feature makes it possible to reduce the computational complexity without increasing either the amount of data stored by the participants or the probability of successful share substitution by dishonest participants.
References
Chattopadhyay A. K. et al. Secret sharing: A comprehensive survey, taxonomy and applications // Computer Science Review. 2024. Vol. 51. Art. 100608.
Shamir A. How to share a secret // Communications of the ACM. 1979. Vol. 22, № 11. P. 612–613.
Beimel A. Secret-sharing schemes: A survey // Proceedings of the International Conference on Coding and Cryptology. Berlin ; Heidelberg : Springer, 2011. P. 11–46.
Tompa M., Woll H. How to share a secret with cheaters // Journal of Cryptology. 1989. Vol. 1, № 3. P. 133–138.
Cabello S., Padró C., Sáez G. Secret sharing schemes with detection of cheaters for a general access structure // Designs, Codes and Cryptography. 2002. Vol. 25, № 2. P. 175–188.
Ogata W., Kurosawa K., Stinson D. R. Optimum secret sharing scheme secure against cheating // SIAM Journal on Discrete Mathematics. 2006. Vol. 20, № 1. P. 79–95.
Cramer R., Dodis Y., Fehr S., Padró C., Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors // Advances in Cryptology – EUROCRYPT 2008 : Lecture Notes in Computer Science. 2008. Vol. 4965. P. 471–488.
Stinson D. R. Combinatorial designs and cryptography, revisited // 50 Years of Combinatorics, Graph Theory, and Computing. Boca Raton : Chapman and Hall/CRC, 2019. P. 319–333.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

