Uniformly robust threshold secret sharing scheme with maximum threshold and reduced complexity of share computation and secret reconstruction

Authors

  • A.M. Alekseychuk Національний технічний університет України “Київський політехнічний інститут імені Ігоря Сікорського”, Ukraine https://orcid.org/0000-0003-4385-4631
  • M.I. Pokydko Адміністрація Державної служби спеціального зв’язку та захисту інформації України, Ukraine https://orcid.org/0009-0002-9225-5694

DOI:

https://doi.org/10.30837/rt.2026.1.224.03

Keywords:

cybersecurity, cyberattack, cryptographic information protection, threshold secret sharing scheme, uniform robustness, unconditional security, reduction of time complexity

Abstract

A secret sharing scheme is a cryptographic protocol that enables a secret to be distributed among a prescribed set of participants in such a way that only certain (authorized) coalitions of participants are able to reconstruct the value of the secret by combining their components (shares of the secret). The collection of all authorized coalitions of participants is referred to as the access structure of the given secret sharing scheme. A scheme is called threshold if its access structure consists of all coalitions whose cardinality is bounded below by a fixed number, called the threshold.

This paper is devoted to the construction of a uniformly robust perfect threshold secret sharing scheme with the maximum threshold (equal to the number of participants), which is characterized by lower time complexity of share computation and secret reconstruction compared to a previously known analogous scheme. The robustness of a scheme means its unconditional security against attacks by dishonest participants who may substitute their own shares in order to distort the value of the secret during reconstruction. A secret sharing scheme is called uniformly robust if it remains secure against this attack regardless of the method used to select the set of secret keys from the collection of all elements that can potentially be distributed.

Interest in such secret sharing schemes is primarily motivated by the possibility of constructing perfect schemes for arbitrary access structures on their basis, which is acceptable for practical applications provided that each participant belongs to a not excessively large number of minimal authorized coalitions.

It is shown that the proposed secret sharing scheme is not inferior to the previously known one with respect to any efficiency metric, while significantly outperforming it in terms of the complexity of the secret sharing and reconstruction procedures. The proposed scheme is constructed on the basis of a random maximum-distance separable (MDS) code, which differs from the Reed–Solomon code underlying the construction of the previously known scheme. This feature makes it possible to reduce the computational complexity without increasing either the amount of data stored by the participants or the probability of successful share substitution by dishonest participants.

References

Chattopadhyay A. K. et al. Secret sharing: A comprehensive survey, taxonomy and applications // Computer Science Review. 2024. Vol. 51. Art. 100608.

Shamir A. How to share a secret // Communications of the ACM. 1979. Vol. 22, № 11. P. 612–613.

Beimel A. Secret-sharing schemes: A survey // Proceedings of the International Conference on Coding and Cryptology. Berlin ; Heidelberg : Springer, 2011. P. 11–46.

Tompa M., Woll H. How to share a secret with cheaters // Journal of Cryptology. 1989. Vol. 1, № 3. P. 133–138.

Cabello S., Padró C., Sáez G. Secret sharing schemes with detection of cheaters for a general access structure // Designs, Codes and Cryptography. 2002. Vol. 25, № 2. P. 175–188.

Ogata W., Kurosawa K., Stinson D. R. Optimum secret sharing scheme secure against cheating // SIAM Journal on Discrete Mathematics. 2006. Vol. 20, № 1. P. 79–95.

Cramer R., Dodis Y., Fehr S., Padró C., Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors // Advances in Cryptology – EUROCRYPT 2008 : Lecture Notes in Computer Science. 2008. Vol. 4965. P. 471–488.

Stinson D. R. Combinatorial designs and cryptography, revisited // 50 Years of Combinatorics, Graph Theory, and Computing. Boca Raton : Chapman and Hall/CRC, 2019. P. 319–333.

Published

2026-04-30

How to Cite

Alekseychuk, A., & Pokydko, M. (2026). Uniformly robust threshold secret sharing scheme with maximum threshold and reduced complexity of share computation and secret reconstruction. Radiotekhnika, (224), 58–64. https://doi.org/10.30837/rt.2026.1.224.03

Issue

Section

Articles