This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Multiple Threshold Schemes Under The Weak Secure Condition

Jiahong Wu, Nan Liu, Wei Kang J. Wu and N. Liu are with the National Mobile Communications Research Laboratory, Southeast University, Nanjing, China (email: {jiahongwu,nanliu}@seu.edu.cn). W. Kang is with the School of Information Science and Engineering, Southeast University, Nanjing, China (email: [email protected]). This work was partially supported by the National Natural Science Foundation of China under Grants 6197113561971135, the Research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2020A03) and Six talent peaks project in Jiangsu Province.
Abstract

In this paper, we consider the case that sharing many secrets among a set of participants using the threshold schemes. All secrets are assumed to be statistically independent and the weak secure condition is focused on. Under such circumstances we investigate the infimum of the (average) information ratio and the (average) randomness ratio for any structure pair which consists of the number of the participants and the threshold values of all secrets.

For two structure pairs such that the two numbers of the participants are the same and the two arrays of threshold values have the subset relationship, two leading corollaries are proved following two directions. More specifically, the bound related to the lengths of shares, secrets and randomness for the complex structure pair can be truncated for the simple one; and the linear schemes for the simple structure pair can be combined independently to be a multiple threshold scheme for the complex one. The former corollary is useful for the converse part and the latter one is helpful for the achievability part.

Three new bounds special for the case that the number of secrets corresponding to the same threshold value tt is lager than tt and two novel linear schemes modified from the Vandermonde matrix for two similar cases are presented. Then come the optimal results for the average information ratio, the average randomness ratio and the randomness ratio. We introduce a tiny example to show that there exists another type of bound that may be crucial for the information ratio, to which we only give optimal results in three cases.

Index Terms:
multi-secret sharing, threshold access structure, the weak secure condition, the Shannon-type inequality, polyhedral cone, projection, generator matrix, linear scheme, Vandermonde matrix, Gaussian Elimination

I introduction

A secret sharing scheme is a method to share a secret among a set of participants such that only certain subsets of participants can recover the secret while any other subset obtains nothing[1].

Establishing bounds on the length of the shares to be given to participants in secret sharing schemes is one of the fundamental problems. If the length of the shares given to participants are too long compared to the length of the secret, the whole scheme may be inefficient. Researchers are interested in the (average) ratio between the length of the shares and the secret, the number of different structures is finite for fixed participant size NN and it turns out that linear schemes can achieve the best ratios when the number of participants N4N\leq 4 [2]. If N=5N=5, [3] had already handled most structures. Until recently the work is moved further by introducing the converse for linear schemes and constructing the corresponding generator matrices [4]. While the general results in converse or achievability are far from tight as discussed in [5].

The problem of estimating the amount of random bits necessary to set up the schemes has also received attention recently. As the amount of randomness needed by an algorithm is to be treated as a computational resource, analogously to the amount of time and space needed. [6] initiated a quantitative investigation of the number of random bits needed by secrets sharing schemes and found optimal results for some schemes. Some other results relate to this criteria can be found in [7, 8].

There are some situations where more than one secret is to be shared among participants. [9] introduced the missile battery scenario where not all of the missiles have the same launch enable code. Linear threshold multisecret sharing schemes are studied in [7] where the distributed secrets are in one-to-one correspondence with the sets of kk-out-of-NN participants, i.e., the number of secrets equals (Nk)\binom{N}{k} and the decoding condition relies on such set of length kk. Distributed multi-user secret sharing scheme is also emerged where secret sharing schemes are implied in the distributed storage systems [10, 11].

From one secret to multiple secrets among the same participants, the decodable condition for the latter can be seen as considering multiple secrets individually. While the secure condition varies depending on two criteria: the strong version and the weak version. For example, the strong secure condition asks that any set of participants which is unable to decode secret S1S_{1} or secret S2S_{2} has no information on the whole set of these two secrets, however, the weak secure condition says that such set of participants has no information on any single one secret, which means some information about secrets S1S_{1} and S2S_{2} like linear combinations may be known.

In [12], the authors show that under the strong secure condition, when the secrets are statistically independent, the best we can do is combining individual ramp schemes independently. [13] has showed that under the weak secure condition, we may gain more efficiency at the cost of security.

In this paper, we focus on the special model implied by [12]. More specifically, we involve threshold scheme such that any set of participant either decodes the secret or learns nothing, while ramp scheme is more general and has gaps. We follow the assumption that all secrets are statistically independent in order to obtain theoretical results that shining the fundamental limits like in [12]. The weak secure condition is focused on, as we care about multiple threshold scheme of any structure, in particular the case that the number of secrets corresponding to the same threshold value tt is lager than tt, the existing different-threshold-bound in [13] is not enough. Like the (average) ratio and the randomness criteria discussed for single secret sharing scheme, we pursue the infimum of the (average) information ratio and the (average) randomness ratio of any possible structure for multiple threshold scheme and hope that such four ratios will give a basic understanding of this problem.

In this paper, every possible structure is of concern for us. For fixed number of participants, when two access structure arrays have the subset relationship, in the converse part we find that the region formed by the Shannon-type inequalities and system conditions of the simple structure is completely embedded in the region of the complex one; in the achievability part linear schemes of the simple structure can be combined independently to be a multiple threshold scheme for the complex structure. Thus the bridge between different structures is built and guaranteed theoretically.

The case that the number of secrets corresponding to the same threshold value tt is lager than tt is special and inspires three new bounds in addition to the different-threshold-bound in [13], which are threshold-sum-difference-bound, threshold-product-bound and threshold-sum-bound. Existing linear scheme when under the weak secure condition is based on the Vandermonde matrix as in [14, 15, 13, 16]. Still in this case we propose two novel linear schemes which are modified from the Vandermonde matrix like in [10] to meet the bounds. And we can learn that as the weak secure condition asks the protection of any single one secret, the assumption that the secrets are statistically independent may promote this requirement.

Finally relate these new findings and existing results to the four ratios, we claim optimality in the average information ratio, the average randomness ratio and the randomness ratio. Still new patterns of bounds need to be investigated further as we only get optimal results for the information ratio in three cases.

II problem formulation

II-A system model

A (t,N,S)(t,N,S) threshold scheme is a protocol to distribute a secret SS among a set of NN participants in such a way that any set of participants of cardinality greater than or equal to t(tN)t(t\leq N) can decode the secret SS and any set of participants of cardinality less than or equal to t1(t2)t-1(t\geq 2) has no information on SS, we refer these two conditions as the decodable condition and the secure condition.

Such protocol is treated as a special discrete probability distribution with N+1N+1 random variables [2]: the secret SS and the ii-th share PiP_{i} of the ii-th participant for every ii in the set [N]:={1,2,,N}(N2)[N]:=\{1,2,\ldots,N\}(N\geq 2). In this way suppose a dealer wants to share the secret S=sS=s among the NN participants, he does this by giving the ii-th participant the share Pi=piP_{i}=p_{i} for every i[N]i\in[N] according to the conditional probability Pr(P1=p1,,PN=pN|S=s)\text{Pr}(P_{1}=p_{1},\ldots,P_{N}=p_{N}|S=s), where {s,p1,,pN}\{s,p_{1},\ldots,p_{N}\} are chosen from a finite field. The specificity of this discrete probability distribution corresponds to the two requirements of the protocol. More specifically, given any set of shares of cardinality greater than or equal to tt, the conditional probability of the secret S=sS=s is equal to 1 or 0, i.e., the conditional entropy of the secret SS given tt or more shares equals 0; given any set of shares of cardinality less than or equal to t1t-1, the conditional probability of the secret S=sS=s is equal to Pr(S=s)\text{Pr}(S=s), i.e., the conditional entropy of the secret SS given t1t-1 or less shares equals the entropy of the secret SS, in other words, the secret SS and t1t-1 or less shares are statistically independent.

In this paper we consider the case in which we want to share many secrets among a set of NN participants, using the threshold schemes. As every single one secret has its corresponding threshold value tt determining the decodable and secure conditions, we naturally arrange the threshold values of all secrets in non-increasing order without loss of generality in an array 𝒯\mathcal{T}, named as the access structure array.

From one secret to multiple secrets among the same NN participants, the decodable condition for the latter can be seen as considering multiple secrets individually, e.g., any set of participants of cardinality greater than or equal to the first element of the access structure array can decode all secrets due to the non-increasing order. While the secure condition varies depending on two criteria: the strong version and the weak version. For example, the strong secure condition asks that any set of participants of cardinality strictly less than the last element of the access structure array has no information on the whole set of |𝒯||\mathcal{T}| secrets, however, the weak secure condition says that such set of participants has no information on any single one secret, which means some information about all |𝒯||\mathcal{T}| secrets like linear combinations may be known. Still use the technique of discrete probability distribution, we define a multiple threshold scheme as follows.

Definition 1 (Multiple Threshold Scheme)

The structure of a multiple threshold scheme is denoted by the pair (N,𝒯=(T1,,TK))(N,\mathcal{T}=(T_{1},\ldots,T_{K})), where NN is the number of participants, KK is the number of unique elements in the access structure array 𝒯\mathcal{T} since there may be some secrets with the same threshold value, and for any k[K]k\in[K], TkT_{k} is also an array with length |Tk||T_{k}| full of tkt_{k}, the same threshold value of the corresponding set of secrets 𝒮k:={Sk,1,,Sk,|Tk|}\mathcal{S}_{k}:=\{S_{k,1},\ldots,S_{k,|T_{k}|}\}. An (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is a discrete probability distribution with N+|𝒯|N+|\mathcal{T}| random variables of which the |𝒯||\mathcal{T}| secrets are assumed to be statistically independent, i.e.,

H(𝒮1,,𝒮K)=k[K]j[|Tk|]H(Sk,j).H(\mathcal{S}_{1},\ldots,\mathcal{S}_{K})=\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}H(S_{k,j}). (1)

Like threshold scheme, the decodable and secure conditions are made in the following. For any k[K]k\in[K],

  1. 1.

    The decodable condition: Any set of at least tkt_{k} participants can decode the set {𝒮k,,𝒮K}\{\mathcal{S}_{k},\ldots,\mathcal{S}_{K}\} of secrets. Formally, for all A[N]A\subseteq[N] with |A|tk|A|\geq t_{k}, let PA:={Pi|iA}P_{A}:=\{P_{i}|i\in A\}, it holds that

    H(𝒮k,,𝒮K|PA)=0.H(\mathcal{S}_{k},\ldots,\mathcal{S}_{K}|P_{A})=0. (2)
  2. 2.

    The strong secure condition: Any set of at most tk1t_{k}-1 participants has no information on the set {𝒮1,,𝒮k}\{\mathcal{S}_{1},\ldots,\mathcal{S}_{k}\} of secrets. Formally, for all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}-1, it holds that

    H(𝒮1,,𝒮k|PA)=H(𝒮1,,𝒮k).H(\mathcal{S}_{1},\ldots,\mathcal{S}_{k}|P_{A})=H(\mathcal{S}_{1},\ldots,\mathcal{S}_{k}). (3)
  3. 3.

    The weak secure condition: Any set of at most tk1t_{k}-1 participants has no information on any single one secret Si,jS_{i,j}, where i[k]i\in[k] and j[|Ti|]j\in[|T_{i}|]. Formally, for all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}-1, it holds that

    H(Si,j|PA)=H(Si,j).H(S_{i,j}|P_{A})=H(S_{i,j}). (4)
Remark 1

Note that these two secure conditions are different and each will be investigated when combined with the same decodable condition and the assumption that all secrets are statistically independent. When the length of the access structure array 𝒯\mathcal{T} equals 11, the assumption of secrets is meaningless, both strong and weak secure condition are the same, that is, the system conditions of multiple threshold scheme degrade to those of threshold scheme.

The efficiency of a threshold scheme is usually measured by the ratio between the length of a share and the secret. Form a set of entropy of every single share, the information ration is defined as the maximum value of this set divided by the entropy of the secret and the average information ratio is defined similarly except that the numerator is replaced by the average value of the same set. As for an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme, the information ration σ\sigma and the average information ration σ~\tilde{\sigma} are defined similarly as follows:

σ=maxi[N]H(Pi)mink[K],j[|Tk|]H(Sk,j),\displaystyle\sigma=\frac{\max_{i\in[N]}H(P_{i})}{\min_{k\in[K],j\in[|T_{k}|]}H(S_{k,j})}, (5)
σ~=i[N]H(Pi)/Nk[K]j[|Tk|]H(Sk,j)/|𝒯|.\displaystyle\tilde{\sigma}=\frac{\sum_{i\in[N]}H(P_{i})/N}{\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}H(S_{k,j})/|\mathcal{T}|}. (6)

Note that the major difference for a multiple threshold scheme is that the denominator of the information ratio is replaced by the minimum of the length of every secret as in [7] and the average information ratio considers the average length of all secrets to divide.

For fixed NN participants, since a multiple threshold scheme has more random variables than a threshold scheme, the former is more complicated. Then comes the notion of randomness, a fundamental computation resource because truly random bits are hard to obtain. The total randomness present in an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is the entropy of the whole NN shares, i.e., H(P[N])H(P_{[N]}), which takes into account also the randomness H(𝒮[K])H(\mathcal{S}_{[K]}) of all secrets as NN shares can decode all secrets. In this paper we mainly consider the randomness for the dealer to set up a multiple threshold scheme for secrets 𝒮[K]\mathcal{S}_{[K]}, that is, the randomness he uses to generate the NN shares given the marginal discrete probability distribution of secrets 𝒮[K]\mathcal{S}_{[K]}. Therefore, we define the randomness ratio τ\tau as the difference between the length of NN shares and that of |𝒯||\mathcal{T}| secrets, then divided by the minimum of the set formed by the length of every secret. The definition for the average randomness ratio is similar except that the denominator is replaced by the average value of such set. More specifically,

τ=H(P[N])H(𝒮[K])mink[K],j[|Tk|]H(Sk,j),\displaystyle\tau=\frac{H(P_{[N]})-H(\mathcal{S}_{[K]})}{\min_{k\in[K],j\in[|T_{k}|]}H(S_{k,j})}, (7)
τ~=H(P[N])H(𝒮[K])k[K]j[|Tk|]H(Sk,j)/|𝒯|.\displaystyle\tilde{\tau}=\frac{H(P_{[N]})-H(\mathcal{S}_{[K]})}{\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}H(S_{k,j})/|\mathcal{T}|}. (8)

As all secrets are statistically independent by the assumption, the randomness of all secrets can be replaced by the sum of entropy of every single secret as in equation (1).

The problem that we investigate in this paper is to optimize the (average) information ratio and the (average) randomness ratio of multiple threshold schemes. Given the number of participants NN and the access structure array 𝒯\mathcal{T}, we define (σ~N,𝒯)σN,𝒯(\tilde{\sigma}_{N,\mathcal{T}})\sigma_{N,\mathcal{T}} as the infimum of the (average) information ration of all (N,𝒯)(N,\mathcal{T}) multiple threshold schemes, moreover, τ~N,𝒯\tilde{\tau}_{N,\mathcal{T}} and τN,𝒯\tau_{N,\mathcal{T}} are defined similarly. For all possible choices of the structure (N,𝒯)(N,\mathcal{T}), we are interested in determining the above four values via their lower bounds and upper bounds.

II-B lower bound

Note that for any probability distribution with N+|𝒯|N+|\mathcal{T}| discrete random variables, we can extract its 2N+|𝒯|12^{N+|\mathcal{T}|}-1 entropies and arrange them into a vector 𝐡\mathbf{h}. Any such vector 𝐡\mathbf{h} satisfies the so-called Shannon-type inequalities [17]. More specifically, let N+|𝒯|\mathcal{H}_{N+|\mathcal{T}|} be a (2N+|𝒯|1)(2^{N+|\mathcal{T}|}-1)-dimension Euclidean space whose coordinates are labeled by hah_{a}, a𝒪\emptyset\neq a\subseteq\mathcal{O}, where 𝒪\mathcal{O} is the set of N+|𝒯|N+|\mathcal{T}| random variables {Pi:i[N]}{Sj:j[|𝒯|]}\{P_{i}:i\in[N]\}\cup\{S_{j}:j\in[|\mathcal{T}|]\} and we use another notation for the secrets. Then let ΓN+|𝒯|\Gamma_{N+|\mathcal{T}|} be a polyhedral cone represented by the intersection of two categories of closed half-spaces, which are derived from the Shannon-type inequalities:

  1. 1.

    Non-decreasing: If ab𝒪a\subseteq b\subseteq\mathcal{O}, then hahbh_{a}\leq h_{b},

  2. 2.

    Submodular: a,b𝒪,hab+habha+hb\forall a,b\subseteq\mathcal{O},h_{a\cup b}+h_{a\cap b}\leq h_{a}+h_{b},

where hh_{\emptyset} is taken to be 0. Note that for every discrete probability distribution and the corresponding vector 𝐡\mathbf{h}, we have (conditional) entropy and (conditional) mutual information greater than and equal to 0, which correspond to being non-decreasing and submodular respectively, then 𝐡ΓN+|𝒯|\mathbf{h}\in\Gamma_{N+|\mathcal{T}|}.

As the independent assumption for secrets (1), the decodable condition (2), the strong secure condition (3) and the weak secure condition (4) can all be handled as homogeneous linear equations involving the coordinates from N+|𝒯|\mathcal{H}_{N+|\mathcal{T}|} only, for fixed structure (N,𝒯)(N,\mathcal{T}) of any multiple threshold scheme, we add four intersections of hyperplane(s) as follows. Let [k:K]:={k,,K}[k:K]:=\{k,\ldots,K\}, for every k[K]k\in[K] and A[N]A\subseteq[N],

𝒞0=\displaystyle\mathcal{C}_{0}= {𝐡N+|𝒯|:h𝒮[K]i[K]j|Ti|hSi,j=0},\displaystyle\{\mathbf{h}\in\mathcal{H}_{N+|\mathcal{T}|}:h_{\mathcal{S}_{[K]}}-\sum_{i\in[K]}\sum_{j\in|T_{i}|}h_{S_{i,j}}=0\}, (9)
𝒞1=\displaystyle\mathcal{C}_{1}= {𝐡N+|𝒯|:h𝒮[k:K],PAhPA=0,|A|tk},\displaystyle\{\mathbf{h}\in\mathcal{H}_{N+|\mathcal{T}|}:h_{\mathcal{S}_{[k:K]},P_{A}}-h_{P_{A}}=0,|A|\geq t_{k}\}, (10)
𝒞2=\displaystyle\mathcal{C}_{2}= {𝐡N+|𝒯|:h𝒮[k],PAhPAh𝒮[k]=0,|A|tk1},\displaystyle\{\mathbf{h}\in\mathcal{H}_{N+|\mathcal{T}|}:h_{\mathcal{S}_{[k]},P_{A}}-h_{P_{A}}-h_{\mathcal{S}_{[k]}}=0,|A|\leq t_{k}-1\}, (11)
𝒞3=\displaystyle\mathcal{C}_{3}= {𝐡N+|𝒯|:hSi,j,PAhPAhSi,j=0,|A|tk1,i[k],j[|Ti|]}.\displaystyle\{\mathbf{h}\in\mathcal{H}_{N+|\mathcal{T}|}:h_{S_{i,j},P_{A}}-h_{P_{A}}-h_{S_{i,j}}=0,|A|\leq t_{k}-1,i\in[k],j\in[|T_{i}|]\}. (12)

In this way, consider a vector 𝐡N+|𝒯|\mathbf{h}\in\mathcal{H}_{N+|\mathcal{T}|} whose components are the 2N+|𝒯|12^{N+|\mathcal{T}|}-1 entropies obtained from an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme under weak secure condition (4), we have 𝐡ΓN+|𝒯|𝒞0,1,3\mathbf{h}\in\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,3}, here we denote 𝒞0𝒞1𝒞3\mathcal{C}_{0}\cap\mathcal{C}_{1}\cap\mathcal{C}_{3} by 𝒞0,1,3\mathcal{C}_{0,1,3} for ease of notation. And when replace weak secure condition by strong one, it follows that the corresponding vector belongs to ΓN+|𝒯|𝒞0,1,2\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,2}.

For a fixed structure (N,𝒯)(N,\mathcal{T}), recall the definitions of the four ratios above, besides their connections with any discrete probability distributions meeting some system conditions, there are also some quantities of interest, i.e., the set of N+|𝒯|N+|\mathcal{T}| entropies of every share and secret {H(Pi):i[N]}{H(Sj):j[|𝒯|]}\{H(P_{i}):i\in[N]\}\cup\{H(S_{j}):j\in[|\mathcal{T}|]\} for the (average) information ratio and the set of 1+|𝒯|1+|\mathcal{T}| entropies of NN shares and every secret {H(P[N])}{H(Sj):j[|𝒯|]}\{H(P_{[N]})\}\cup\{H(S_{j}):j\in[|\mathcal{T}|]\} for the (average) randomness ratio. As for the polyhedral cone ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3} under (strong) weak secure condition, of which we care about the sets of the corresponding coordinates likewise, i.e., 𝐡I:={hPi:i[N]}{hSj:j[|𝒯|]}\mathbf{h}_{I}:=\{h_{P_{i}}:i\in[N]\}\cup\{h_{S_{j}}:j\in[|\mathcal{T}|]\} for the (average) information ratio and 𝐡R:={hP[N]}{hSj:j[|𝒯|]}\mathbf{h}_{R}:=\{h_{P_{[N]}}\}\cup\{h_{S_{j}}:j\in[|\mathcal{T}|]\} for the (average) randomness ratio. In this way, the region involving these coordinates is enough to derive the lower bounds for the four ratios. To gain a more exact characterization, a suitable concept is illustrated as follows: A projection [18] of a region 𝒫\mathcal{P} in n=n1×n2\mathbb{R}^{n}=\mathbb{R}^{n_{1}}\times\mathbb{R}^{n_{2}} onto its subspace of the first n1n_{1} coordinates is

proj[n1](𝒫)={𝐱1n1:𝐱2,(𝐱1T,𝐱2T)T𝒫}.\textrm{proj}_{[n_{1}]}(\mathcal{P})=\{\mathbf{x}_{1}\in\mathbb{R}^{n_{1}}:\exists\mathbf{x}_{2},(\mathbf{x}_{1}^{T},\mathbf{x}_{2}^{T})^{T}\in\mathcal{P}\}. (13)

Then proj𝐡I(ΓN+|𝒯|𝒞0,1,(2)3)\text{proj}_{\mathbf{h}_{I}}(\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}) and proj𝐡R(ΓN+|𝒯|𝒞0,1,(2)3)\text{proj}_{\mathbf{h}_{R}}(\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}) are essential for the (average) information ratio and (average) randomness ratio respectively.

Recall that every possible structure (N,𝒯)(N,\mathcal{T}) is of concern for us. For fixed number NN of participants, two different access structure arrays 𝒯=(T1,,TK)\mathcal{T}^{\prime}=(T_{1}^{\prime},\ldots,T_{K^{\prime}}^{\prime}) and 𝒯=(T1,,TK)\mathcal{T}=(T_{1},\ldots,T_{K}) may have a relationship similar to the subset concept from set theory, thus we give the following definition with some abuse of notation:

Definition 2 (Subset of Arrays)

𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T} if and only if for every i[K]i\in[K^{\prime}], there exists j[K]j\in[K] such that ti=tjt_{i}^{\prime}=t_{j} and |Ti||Tj||T_{i}^{\prime}|\leq|T_{j}|, where tit_{i}^{\prime} is the same threshold value of the sub-array TiT_{i}^{\prime}.

When 𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T} and for the same number NN of participants, in the polyhedral cone formed by the Shannon-type inequalities, there exist some interesting geometrical properties between two regions ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3} and ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime}, where 𝒞.\mathcal{C}_{.}^{\prime} is the intersection of hyperplanes defined from the structure (N,𝒯)(N,\mathcal{T}^{\prime}). For the ease of notation we reuse coordinates of ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime} from ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3} and rearrange the elements of these two access structure arrays such that for every i[|𝒯|]i\in[|\mathcal{T}^{\prime}|], the two corresponding secrets from 𝒯\mathcal{T}^{\prime} and 𝒯\mathcal{T} respectively have the same threshold value, here the non-increasing order of both access structure arrays may be broken due to such forcible arrangement. Denote all coordinates of the former region by 𝐡L\mathbf{h}_{L} and we give the following theorem:

Theorem 1

When the number of participants NN is fixed and two access structure arrays have the subset relationship, i.e., 𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T}, the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure (N,𝒯)(N,\mathcal{T}^{\prime}) is exactly equal to the projection of the corresponding polyhedral cone of the structure (N,𝒯)(N,\mathcal{T}), i.e., ΓN+|𝒯|𝒞0,1,(2)3=proj𝐡L(ΓN+|𝒯|𝒞0,1,(2)3)\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime}=\text{proj}_{\mathbf{h}_{L}}(\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}).

Proof:

The proof is conducted in two directions, i.e., any point of the former is in the later, and vice versa. The detail is put in Appendix A-A. ∎

Remark 2

This theorem offers a theoretical guarantee that some important bounds of the bigger region, after a projection algorithm like Fourier-Motzkin-Elimination, are still feasible and even fundamental for the smaller region. A direct example is the following corollary.

Corollary 1

When the number of participants NN is fixed and two access structure arrays have the subset relationship, i.e., 𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T}, a feasible bound for the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure (N,𝒯)(N,\mathcal{T}) can be truncated to be a feasible bound of the corresponding polyhedral cone of the structure (N,𝒯)(N,\mathcal{T}^{\prime}). More specifically, for any vector 𝐡ΓN+|𝒯|𝒞0,1,(2)3\mathbf{h}\in\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}, if there exists a feasible bound such that α0hP[N]+i[N]αihPij[|𝒯|]βjhSj\alpha_{0}h_{P_{[N]}}+\sum_{i\in[N]}\alpha_{i}h_{P_{i}}\geq\sum_{j\in[|\mathcal{T}|]}\beta_{j}h_{S_{j}}, where every coefficient βj\beta_{j} is non-negative, then for any vector 𝐡ΓN+|𝒯|𝒞0,1,(2)3\mathbf{h}^{\prime}\in\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime}, α0hP[N]+i[N]αihPij[|𝒯|]βjhSj\alpha_{0}h_{P_{[N]}}^{\prime}+\sum_{i\in[N]}\alpha_{i}h_{P_{i}}^{\prime}\geq\sum_{j\in[|\mathcal{T}^{\prime}|]}\beta_{j}h_{S_{j}}^{\prime}.

Proof:

For any i[|𝒯|]i\in[|\mathcal{T}|], consider a submodular inequality hSi+hP1hSi,P10h_{S_{i}}+h_{P_{1}}-h_{S_{i},P_{1}}\geq 0 and a non-decreasing one hP1+hSi,p10-h_{P_{1}}+h_{S_{i},p_{1}}\geq 0, plus these two together, we get hSi0h_{S_{i}}\geq 0. Then α0hP[N]+i[N]αihPij[|𝒯|]βjhSj\alpha_{0}h_{P_{[N]}}+\sum_{i\in[N]}\alpha_{i}h_{P_{i}}\geq\sum_{j\in[|\mathcal{T}^{\prime}|]}\beta_{j}h_{S_{j}} is also a feasible bound. Based on the equation result of theorem 1, such bound is also feasible for the vectors of the region ΓN+|𝒯|𝒞0,1,(2)3\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime}. ∎

Remark 3

For an access structure array with continuous unique threshold values, the proofs of some bounds may be more read-friendly. And by this corollary, the bound for a non-continuous access structure array 𝒯\mathcal{T}^{\prime} can be obtained by the truncation from the bound of a continuous access structure array 𝒯𝒯\mathcal{T}\supseteq\mathcal{T}^{\prime}, and it turns out that some bounds obtained in this way are enough for the four ratios.

II-C linear scheme

Before introducing the so-called linear scheme [15], some concepts need to be illustrated. Let 𝒱\mathcal{V} be a vector space with finite dimension nn over a finite field 𝔽q\mathbb{F}_{q}, where qq is a prime number. Recall that 𝒪\mathcal{O} is the set of N+|𝒯|N+|\mathcal{T}| random variables essential to an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme. For every i𝒪i\in\mathcal{O}, denote a subset of 𝒱\mathcal{V} by Vi{V}_{i}, we assume that all vectors of Vi{V}_{i} are linear independent, then the length of such subset is rk(Vi)\text{rk}(V_{i}), here rk(.)\text{rk}(.) calculates the rank of its input. Hereafter, we treat each Vi{V}_{i} as a matrix of shape n×rk(Vi)n\times\text{rk}(V_{i}) and stack such |𝒪||\mathcal{O}| matrices in sequence horizontally (column wise) into a bigger matrix 𝐆𝔽qn×i𝒪rk(Vi)\mathbf{G}\in\mathbb{F}_{q}^{n\times\sum_{i\in\mathcal{O}}\text{rk}({V}_{i})}, referred as a generator matrix.

Then consider a uniform discrete probability distribution whose alphabet is the set of qnq^{n} different row vectors with length nn taking values from 𝔽q\mathbb{F}_{q}. These vectors can be stacked vertically into a matrix 𝐂𝔽qqn×n\mathbf{C}\in\mathbb{F}_{q}^{q^{n}\times n}. For 𝐂𝐆𝔽qqn×i𝒪rk(Vi)\mathbf{CG}\in\mathbb{F}_{q}^{q^{n}\times\sum_{i\in\mathcal{O}}\text{rk}({V}_{i})}, with the set of row vectors as the alphabet and that the probability of each equals 1/qn1/q^{n}, it forms a new discrete probability distribution with random variables from the set 𝒪\mathcal{O}, where x𝒪,H(x)=rk(Vx):=rk(ixVi)\forall\emptyset\neq x\subseteq\mathcal{O},H(x)=\text{rk}({V}_{x}):=\text{rk}(\cup_{i\in x}{V}_{i}), with the base of the logarithm being qq and Vx{V}_{x} denotes a matrix stacked horizontally by the corresponding |x||x| matrices. Note that if rk(V𝒪)<n\text{rk}({V}_{\mathcal{O}})<n, then some row vectors of 𝐂𝐆\mathbf{CG} are the same and the corresponding probabilities need to be summed; otherwise, all are unique.

Recall that KK is the number of unique elements in the access structure array 𝒯\mathcal{T} and for any k[K]k\in[K], TkT_{k} is also an array with length |Tk||T_{k}| full of tkt_{k}, the same threshold value of the corresponding set of secrets 𝒮k={Sk,1,,Sk,|Tk|}\mathcal{S}_{k}=\{S_{k,1},\ldots,S_{k,|T_{k}|}\}. Based on the relationship between discrete probability distribution and generator matrix, consider the latter as a linear scheme, then we give the following definition of linear multiple threshold scheme:

Definition 3 (Linear Multiple Threshold Scheme)

A linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is a special generator matrix satisfying the following system conditions:

  1. 1.

    All secrets are statistically independent: rk(V𝒮[K])=k[K]j[|Tk|]rk(VSk,j)\text{rk}(V_{\mathcal{S}_{[K]}})=\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}\text{rk}(V_{S_{k,j}}).

  2. 2.

    The decodable condition: For every k[K]k\in[K] and all A[N]A\subseteq[N] with |A|tk|A|\geq t_{k}, rk(V𝒮[k:K],PA)=rk(VPA)\text{rk}(V_{\mathcal{S}_{[k:K]},P_{A}})=\text{rk}(V_{P_{A}}).

  3. 3.

    The strong secure condition: For every k[K]k\in[K] and all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}-1, rk(V𝒮[k],PA)=rk(V𝒮[k])+rk(VPA)\text{rk}(V_{\mathcal{S}_{[k]},P_{A}})=\text{rk}(V_{\mathcal{S}_{[k]}})+\text{rk}(V_{P_{A}}).

  4. 4.

    The weak secure condition: For every k[K]k\in[K] and all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}-1, rk(VSi,j,PA)=rk(VSi,j)+rk(VPA)\text{rk}(V_{{S}_{i,j},P_{A}})=\text{rk}(V_{{S}_{i,j}})+\text{rk}(V_{P_{A}}), where i[k]i\in[k] and j[|Ti|]j\in[|T_{i}|].

Note that these four conditions are rewritten from (1), (2), (3) and (4) in section II-A, still only one of the two secure conditions is chosen for a corresponding model and for simplicity we do not mention which secure condition is implied in this subsection.

Remark 4

From the view of a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme, both the generation of NN shares and the decoding of secrets can be treated as linear mappings, which are more neat than the general ones. As every codeword corresponds to |𝒯||\mathcal{T}| secret values and a distribution of shares, furthermore, the whole probability distribution is uniform, then the length of every share is exactly the number of symbols given to the corresponding participant from the dealer. The decodable condition tells that every vector 𝐚\mathbf{a} in V𝒮[k:K]V_{\mathcal{S}_{[k:K]}} can be written as a linear combination of vectors in VPAV_{P_{A}}, which means that any tkt_{k} or more shares determine the secrets 𝒮[k:K]\mathcal{S}_{[k:K]} linearly. As for the (strong) weak secure condition, all elements of the union of V(𝒮[k])Si,jV_{(\mathcal{S}_{[k]})S_{i,j}} and VPAV_{P_{A}} are linear independent, which implies that the random variables (𝒮[k])Si,j(\mathcal{S}_{[k]})S_{i,j} and PAP_{A} constructed are statistically independent. The independent assumption for all secrets follows similarly.

In this paper we only use linear multiple threshold schemes for achievability. Then the entropy part from all four ratios can be replaced by the the rank part. For a fixed structure (N,𝒯)(N,\mathcal{T}), if we can construct a corresponding linear multiple threshold scheme, i.e., a generator matrix satisfying the system conditions, we have upper bounds of the four ratios. When upper bound and lower bound match, the optimum can be claimed.

As we care about every possible structure (N,𝒯)(N,\mathcal{T}), recall that for fixed number of participants NN, two different access structure arrays 𝒯=(T1,,TK)\mathcal{T}^{\prime}=(T_{1}^{\prime},\ldots,T_{K^{\prime}}^{\prime}) and 𝒯=(T1,,TK)\mathcal{T}=(T_{1},\ldots,T_{K}) may have a subset relationship similar to two sets according to definition 2. Still for the ease of notation, we rearrange the elements of these two access structure arrays such that for every i[|𝒯|]i\in[|\mathcal{T}^{\prime}|], the two corresponding secrets from 𝒯\mathcal{T}^{\prime} and 𝒯\mathcal{T} respectively have the same threshold value, finally we claim that

Theorem 2

When the number of participants NN is fixed and two access structure arrays have the subset relationship, i.e., 𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T}, any generator matrix VV for the structure (N,𝒯)(N,\mathcal{T}^{\prime}) is also a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme which reuses the random variable of the former and rk(VSi)=0,i[|𝒯|+1,|𝒯|]\text{rk}(V_{S_{i}})=0,\forall i\in[|\mathcal{T}^{\prime}|+1,|\mathcal{T}|].

Proof:

The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix A-B. ∎

Remark 5

The construction of a linear multiple threshold scheme may be easier when there are not too many secrets to share, i.e., the length of the access structure array is small. In this way, this theorem offers a degradation method to construct a more complicated scheme. As will be discussed below, it turns out to be a building block from simple schemes to a complex one.

Different generator matrices can be combined independently, i.e., in the diagonal, to form a bigger generator matrix of which every rank term equals the sum of those from the original generator matrices. The detail is in the following:

Definition 4 (Independent Combination of Generator Matrices)

For the same set of random variables 𝒪\mathcal{O}, assume over the same finite field there are AA existing generator matrices, each is denoted by Vi,i[A]V^{i},\ i\in[A] and the corresponding shape is rk(V𝒪i)×j𝒪rk(Vji)\text{rk}(V_{\mathcal{O}}^{i})\times\sum_{j\in\mathcal{O}}\text{rk}(V_{j}^{i}). The independent combination of these AA generator matrices is a bigger generator matrix VV, where for any j𝒪j\in\mathcal{O} the sub-matrix VjV_{j} is a diagonal arrangement of the corresponding AA sub-matrices from the original generator matrices. More specifically, let the shape of the sub-matrix VjV_{j} be i[A]rk(V𝒪i)×i[A]rk(Vji)\sum_{i\in[A]}\text{rk}(V_{\mathcal{O}}^{i})\times\sum_{i\in[A]}\text{rk}(V_{j}^{i}) and fill VjV_{j} with zeroes, then for every i[A]i\in[A] in turn put VjiV_{j}^{i} in the diagonal of VjV_{j}.

Note that the we can do Gaussian-Elimination towards the rows of a generator matrix and the corresponding 2|𝒪|12^{|\mathcal{O}|}-1 rank terms do not change, in this way we fix the number of rows of a generator matrix to be the rank of the whole matrix. When there exist an all-zero VjiV_{j}^{i}, we do nothing for the sub-matrix VjV_{j} of the final bigger generator matrix when it is the turn of the sub-matrix VjiV_{j}^{i} from original generator matrices in the diagonal arrangement.

Remark 6

By the diagonal arrangement and based on the same finite field, it follows that for any non-empty set B𝒪B\subseteq\mathcal{O}

rk(VB)=i[A]rk(VBi).\text{rk}(V_{B})=\sum_{i\in[A]}\text{rk}(V_{B}^{i}). (14)

The rigorous proof can follow the direct implementation of Gaussian-Elimination horizontally (column wise) and is omitted here.

Via the claim that a simple linear multiple threshold scheme can be treated as a complex one with somewhat of degradation in theorem 2, and using the construction method that independently combing existing linear multiple threshold schemes as in definition 4, we give the following corollary.

Corollary 2

When the number of participants NN is fixed and A+1A+1 access structure arrays have the subset relationship, i.e., 𝒯i𝒯,i[A]\mathcal{T}^{i}\subseteq\mathcal{T},\ i\in[A]. Assume over the same finite field there are AA existing generator matrices, each is denoted by ViV^{i} and for the structure (N,𝒯i)(N,\mathcal{T}^{i}). Then the independent combination of these AA generator matrices is a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme.

Proof:

From theorem 2, for any i[A]i\in[A], a linear scheme for the structure (N,𝒯i)(N,\mathcal{T}^{i}) is also a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme when 𝒯i𝒯\mathcal{T}^{i}\subseteq\mathcal{T}. Recall the system conditions of a linear multiple threshold scheme in definition 3, each of them is some equations involving the rank terms only. As the independent combination results in the sum of rank terms as in (14), the conclusion follows. ∎

Remark 7

From one secret to multiple ones, a trivial idea to accomplish the construction of an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is combining |𝒯||\mathcal{T}| threshold schemes independently. As for liner schemes, this corollary applies the notion of independence and builds a bridge from some simple schemes to a complex one. It turns out that some linear schemes obtained in this way are enough for the four ratios.

III (Average) information ratio

We firstly discuss multiple threshold schemes with the strong secure condition, of which some results can be modified for the weak one.

III-A strong secure

III-A1 converse

We firstly discuss some converse results that are fundamental for lower bounds of the (average) information ratio.

Lemma 1 (Size of A Secret)

For any (t,N,S)(t,N,S) threshold scheme, if t<Nt<N, then

H(S)I(Pi1;Pi2|Pi3,,Pit+1),H(S)\leq I(P_{i_{1}};P_{i_{2}}|P_{i_{3}},\ldots,P_{i_{t+1}}),

where (i1,,it+1)(i_{1},\ldots,i_{t+1}) are t+1t+1 different values chosen from the set [N][N].

Proof:

To improve readability, we replace the index tit_{i} by ii, the final result can be transformed back later. Hereafter, we use this trick in the following whole paper.

H(S)=\displaystyle H(S)= H(S|P3,,Pt+1)H(S|P1,P3,,Pt+1)\displaystyle H(S|P_{3},\ldots,P_{t+1})-H(S|P_{1},P_{3},\ldots,P_{t+1})
H(S|P2,P3,,Pt+1)+H(S|P1,,Pt+1)\displaystyle-H(S|P_{2},P_{3},\ldots,P_{t+1})+H(S|P_{1},\ldots,P_{t+1})
=\displaystyle= I(S;P1|P3,,Pt+1)I(S;P1|P2,P3,,Pt+1)\displaystyle I(S;P_{1}|P_{3},\ldots,P_{t+1})-I(S;P_{1}|P_{2},P_{3},\ldots,P_{t+1})
=\displaystyle= H(P1|P3,,Pt+1)H(P1|S,P3,,Pt+1)\displaystyle H(P_{1}|P_{3},\ldots,P_{t+1})-H(P_{1}|S,P_{3},\ldots,P_{t+1})
H(P1|P2,P3,,Pt+1)+H(P1|S,P2,P3,,Pt+1)\displaystyle-H(P_{1}|P_{2},P_{3},\ldots,P_{t+1})+H(P_{1}|S,P_{2},P_{3},\ldots,P_{t+1})
=\displaystyle= I(P1;P2|P3,,Pt+1)I(P1;P2|S,P3,,Pt+1)\displaystyle I(P_{1};P_{2}|P_{3},\ldots,P_{t+1})-I(P_{1};P_{2}|S,P_{3},\ldots,P_{t+1})
\displaystyle\leq I(P1;P2|P3,,Pt+1)\displaystyle I(P_{1};P_{2}|P_{3},\ldots,P_{t+1})

Note that the first equation is nothing but the decodable and secure conditions of a (t,N,S)(t,N,S) threshold scheme, the other equations are from the definitions of (conditional) entropy and (conditional) mutual information, and the last inequality uses the submodular property. ∎

Remark 8

Existing result shows that the length of a share must be bigger than or equal to the length of a secret [5], for example, if t=Nt=N, H(S)=H(S|Pi2,,Pit)H(S|Pi1,,Pit)=I(S;Pi1|Pi2,,Pit)H(Pi1|Pi2,,Pit)H(Pi1)H(S)=H(S|P_{i_{2}},\ldots,P_{i_{t}})-H(S|P_{i_{1}},\ldots,P_{i_{t}})=I(S;P_{i_{1}}|P_{i_{2}},\ldots,P_{i_{t}})\leq H(P_{i_{1}}|P_{i_{2}},\ldots,P_{i_{t}})\leq H(P_{i_{1}}). While this lemma tells that the length of a secret is not larger than the mutual information between any two shares given any other t1t-1 shares. In this sense, this bound is tighter and will be a building block for other interesting bounds of this paper.

From one secret to multiple ones, when under the strong secure condition, the following bound is enough for the investigation of the (average) information ratio and even the heterogeneous-secret-size problem as in [12].

Lemma 2

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition, it holds that k[K]j[|Tk|]H(Sk,j)H(Pi)\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}H(S_{k,j})\leq H(P_{i}), i[N]\forall i\in[N].

Proof:

The proof is based on the mutual information bound as in lemma 1. The detail is in Appendix B-A. ∎

Remark 9

This bound says that when under the strong secure condition, the sum of the length of every secret is no bigger than the length of any single share. This is implied by the work from [12], while our proof may be more read-friendly due to the building block in lemma 1. Then consider the (average) information ratio, for any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme, we apply this bound and it turns out that σN,𝒯|𝒯|\sigma_{N,\mathcal{T}}\geq|\mathcal{T}| and σ~N,𝒯|𝒯|\tilde{\sigma}_{N,\mathcal{T}}\geq|\mathcal{T}|, i.e., lower bounds are formed.

III-A2 achievability

Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio.

Still we want to link the known results of a single secret to multiple ones. For a linear (t,N,S)(t,N,S) threshold scheme, its generator matrix is closely related to the Vandermonde matrix over a finite field. More specifically, let V(t,[N+1])V(t,[N+1]) fully denote the following matrix from 𝔽qt×(N+1)\mathbb{F}_{q}^{t\times(N+1)}, where qq is a prime number larger than N+1N+1. In this notation, tt and [N+1][N+1] means the number of rows of the matrix and the elements of the second row in increasing order respectively.

Definition 5 (The Transpose of A Vandermonde Matrix)
V(t,[N+1]):=[1111123N+112232(N+1)212t13t1(N+1)t1],V(t,[N+1]):=\begin{bmatrix}1&1&1&\cdots&1\\ 1&2&3&\cdots&N+1\\ 1&2^{2}&3^{2}&\cdots&(N+1)^{2}\\ \vdots&\vdots&\vdots&\ddots&\vdots\\ 1&2^{t-1}&3^{t-1}&\cdots&(N+1)^{t-1}\end{bmatrix}, (15)

here we let the first column be the sub-matrix VSV_{S}, the second column correspond to the first share P1P_{1} and so on. Due to the determinant of a Vandermonde matrix, any tt columns corresponding to any tt shares are full rank, so are any t1t-1 columns corresponding to any t1t-1 shares combined with the first column corresponding to the secret SS, then V(t,[N+1])V(t,[N+1]) is a linear (t,N,S)(t,N,S) threshold scheme.

Recall that from one secret to multiple ones, we can imply the independent combination of |𝒯||\mathcal{T}| linear threshold schemes to get a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme according to corollary 2. More specifically, given any structure (N,𝒯)(N,\mathcal{T}), we prepare a linear (tk,N,Sk,j)(t_{k},N,S_{k,j}) threshold scheme based on V(tk,[N+1])V(t_{k},[N+1]) for any k[K],j[|Tk|]k\in[K],j\in[|T_{k}|], each of them is also a degradation version of linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition. The independent combination of these |𝒯||\mathcal{T}| generator matrices leads to a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition such that H(Sk,j)=1,k[K],j[|Tk|]H(S_{k,j})=1,\forall k\in[K],j\in[|T_{k}|] and H(Pi)=|𝒯|,i[N]H(P_{i})=|\mathcal{T}|,\forall i\in[N]. And the order of the underlying finite field is still larger than N+1N+1. Then we have σN,𝒯|𝒯|\sigma_{N,\mathcal{T}}\leq|\mathcal{T}| and σ~N,𝒯|𝒯|\tilde{\sigma}_{N,\mathcal{T}}\leq|\mathcal{T}|. Finally the optimum can be claimed.

Theorem 3

The infimum of the (average) information ratio equals the number of the secrets, i.e., (σ~N,𝒯)σN,𝒯=|𝒯|(\tilde{\sigma}_{N,\mathcal{T}})\sigma_{N,\mathcal{T}}=|\mathcal{T}|, when under the strong secure condition.

Proof:

The proof follows from the above illustrations. ∎

Remark 10

The novelty of this theorem compared to the known results of [12] is embedding the two criteria, i.e., the average information ratio and information ratio. Both criteria show that the more secrets, the less efficiency.

III-B weak secure

III-B1 converse

We firstly discuss some converse results that are fundamental for lower bounds of the (average) information ratio when under the weak secure condition.

Lemma 3 (Different-Threshold-Bound)

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the weak secure condition, for any share index i[N]i\in[N] and secret index jk[|Tk|]j_{k}\in[|T_{k}|] of the sub-array TkT_{k}, it holds that

k[K]H(Sk,jk)H(Pi).\displaystyle\sum_{k\in[K]}H(S_{k,j_{k}})\leq H(P_{i}). (16)
Proof:

Recall that the difference between the strong secure condition (3) and the weak one (3) is the knowledge of secrets. More specifically, substitute the secrets H(𝒮k)H(\mathcal{S}_{k}^{\prime}) of the bound in the proof of lemma 2 by a single secret H(Sk,jk)H(S_{k,j_{k}}), the result follows. ∎

Remark 11

Recall that the access structure array 𝒯\mathcal{T} can be divided into KK different sub-arrays based on KK unique threshold values. In this way different-threshold-bound says that the sum of the length of different kinds of secrets is no bigger than the length of any secret, which is a weak version of lemma 2 due to the weak secure condition. This bound is already known as a special case of the result from [13]. We find that it is crucial for the (average) information ratio. More specifically, for any structure (N,𝒯)(N,\mathcal{T}), the infimum of the information ratio σN,𝒯K\sigma_{N,\mathcal{T}}\geq K.

As mentioned before, we care about every possible structure (N,𝒯)(N,\mathcal{T}), and it leads to a discovery of two new bounds. Recall that the access structure array 𝒯\mathcal{T} consists of KK sub-arrays, for any i[K]i\in[K] each array TiT_{i} is full of the same threshold value tit_{i}.

Lemma 4 (Threshold-Sum-Difference-Bound)

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the weak secure condition, fix an index k[K]k\in[K], similar to lemma 3 let index jij_{i} be any element of the set [|Ti|][|T_{i}|], also let (i1,,itk)(i_{1},\ldots,i_{t_{k}}) be tkt_{k} different values chosen from the set [N][N] like lemma 1, then

tki[k1]H(Si,ji)+i[k:K]j[|Ti|]H(Si,j)+i[k+1:K](tkti)H(Si,ji)j[tk]H(Pij).t_{k}\sum_{i\in[k-1]}H(S_{i,j_{i}})+\sum_{i\in[k:K]}\sum_{j\in[|T_{i}|]}H(S_{i,j})+\sum_{i\in[k+1:K]}(t_{k}-t_{i})H(S_{i,j_{i}})\leq\sum_{j\in[t_{k}]}H(P_{i_{j}}). (17)
Proof:

The proof can be divided into three parts, each results in a special bound. The detail is in Appendix B-B. ∎

Remark 12

This bound is novel and is important for the (average) information ratio. More specifically, for any structure (N,𝒯)(N,\mathcal{T}), the infimum of the information ratio σN,𝒯maxk[K](K1+|Tk|/tk+(i[k+1:K]|Ti|ti)/tk)\sigma_{N,\mathcal{T}}\geq\max_{k\in[K]}(K-1+|T_{k}|/t_{k}+(\sum_{i\in[k+1:K]}|T_{i}|-t_{i})/t_{k}).

Lemma 5 (Threshold-Product-Bound)

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the weak secure condition, similar to lemma 1 let (i1,,it1)(i_{1},\ldots,i_{t_{1}}) be t1t_{1} different values chosen from the set [N][N], then

i[K]k[K]tktij[|Ti|]H(Si,j)k[2:K]tkj[t1]H(Pij).\sum_{i\in[K]}\frac{\prod_{k\in[K]}t_{k}}{t_{i}}\sum_{j\in[|T_{i}|]}H(S_{i,j})\leq\prod_{k\in[2:K]}t_{k}\sum_{j\in[t_{1}]}H(P_{i_{j}}). (18)
Proof:

The proof uses induction, where two pattern inequalities are summed at every turn. The detail is in Appendix B-C. ∎

Remark 13

This bound is novel and is used for the information ratio only. More specifically, for any structure (N,𝒯)(N,\mathcal{T}), the infimum of the information ratio σN,𝒯i[K]|Ti|/ti\sigma_{N,\mathcal{T}}\geq\sum_{i\in[K]}|T_{i}|/t_{i}.

We give a lower bound for the average information ratio using different-threshold-bound and threshold-sum-difference-bound only. Recall that the access structure array 𝒯\mathcal{T} consists of KK sub-arrays, for any i[K]i\in[K] each array TiT_{i} of them is full of the same threshold value tit_{i}.

Lemma 6

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme under the weak secure condition, the average information ratio is closely related to the a unique threshold value of the access structure array 𝒯\mathcal{T} and the number of secrets corresponding to it. More specifically, infimum of the average information ratio

σ~N,𝒯|𝒯|maxi[K](min(ti,|Ti|)).\displaystyle\tilde{\sigma}_{N,\mathcal{T}}\geq\frac{|\mathcal{T}|}{\max_{i\in[K]}(\min(t_{i},|T_{i}|))}. (19)
Proof:

The proof uses different-threshold-bound (16) and threshold-sum-difference-bound (17). The detail is in Appendix B-D. ∎

Remark 14

We will show in the achievability part that this lower bound is tight, which means a specific sub-array TiT_{i} of the access structure array 𝒯\mathcal{T} plays a central role for the average information ratio and for a fixed threshold value tit_{i}, a suitable number |Ti||T_{i}| of secrets improves this performance criteria.

As for the information ratio, the above three bounds may not be enough to obtain the optimum results, i.e., efforts in investigating more bounds are needed. For example, consider the structure (N=3,𝒯=(3,3,3,3,2,2,2))(N=3,\mathcal{T}=(3,3,3,3,2,2,2)), a new bound is that

H(S1,1)+j[4]H(S1,j)+2j[3]H(S2,j)i[3]H(Pi)+H(P3).\displaystyle H(S_{1,1})+\sum_{j\in[4]}H(S_{1,j})+2\sum_{j\in[3]}H(S_{2,j})\leq\sum_{i\in[3]}H(P_{i})+H(P_{3}). (20)
Proof:

Still rewrite the bound (35), we have

2H(P[3])+H(𝒮2)i[3]H(P[3]/{i}).2H(P_{[3]})+H(\mathcal{S}_{2})\leq\sum_{i\in[3]}H(P_{[3]/\{i\}}).

Consider that H(P[3])=H(𝒮[2],P[3])H(𝒮[2])H(P_{[3]})=H(\mathcal{S}_{[2]},P_{[3]})\geq H(\mathcal{S}_{[2]}) and H(P[3])=H(𝒮[2],P[3])H(S1,1,P[2])=H(S1,1)+H(P[2])H(P_{[3]})=H(\mathcal{S}_{[2]},P_{[3]})\geq H({S}_{1,1},P_{[2]})=H({S}_{1,1})+H(P_{[2]}), the result follows. ∎

Remark 15

However, we do not know how to generalize this kind of bound as we care about all possible structure (N,𝒯)(N,\mathcal{T}) and whether this new bound plays an important role for the information ratio is unclear. In this way, the infimum of the information ratio is claimed for some special cases only as will be discussed in the achievability part.

III-B2 achievability

Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio and even the (average) randomness ratio.

Let tt and aa be two positive integers, recall that V(t,[a])V(t,[a]) is a transpose of a Vandermonde matrix from 𝔽qt×a\mathbb{F}_{q}^{t\times a}, where qq is a prime number larger than aa, tt means the number of rows and [a][a] is exactly the set of elements of the second row. When under the weak secure condition, we give the following building block for linear multiple threshold schemes:

Lemma 7

For an (N,𝒯)(N,\mathcal{T}) multiple threshold scheme whose access structure array consists of only one unique threshold value, i.e., |𝒯|=|T1||\mathcal{T}|=|T_{1}|. Let n=min(t1,|T1|)n=\min(t_{1},|T_{1}|), then V(t1,n+N)V(t_{1},n+N) is a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme under the weak secure condition where each column corresponds to a random variable, e.g., the first column is S1,1S_{1,1}, the nthn-th one is S1,nS_{1,n}, the (n+1)th(n+1)-th one is P1P_{1} and so on.

Note that in this way we have H(S1,i)=H(Pj)=1,i[n],j[N]H(S_{1,i})=H(P_{j})=1,\forall i\in[n],j\in[N] and H(S1,i)=0,i[n+1:|𝒯|]H(S_{1,i})=0,\forall i\in[n+1:|\mathcal{T}|] when the number of secrets is bigger than the threshold value.

Proof:

In V(t1,n+N)V(t_{1},n+N), any t1t_{1} columns are full rank. As nt1n\leq t_{1}, nn secrets are statistically independent. The decodable condition follows as the threshold value t1t_{1} equals the number of rows. Since t11+1=t1t_{1}-1+1=t_{1}, the weak secure condition is guaranteed. When |𝒯|>t1|\mathcal{T}|>t_{1}, the generator matrix V(t1,t1+N)V(t_{1},t_{1}+N) is actually a linear (N,𝒯)(N,\mathcal{T}^{\prime}) multiple threshold scheme where 𝒯𝒯\mathcal{T}^{\prime}\subseteq\mathcal{T}, from theorem 2 the result follows. ∎

Remark 16

Such construction of multiple threshold scheme when under the weak secure condition is already known [15, 13].

Recall that the access structure array 𝒯\mathcal{T} consists of KK sub-arrays, for any i[K]i\in[K] each array TiT_{i} of them is full of the same threshold value tit_{i}. Fix an index k[K]k\in[K] such that a=min(tk,|Tk|)a=\min(t_{k},|T_{k}|) is the maximum among all KK chooses. It follows from lemma 7 and theorem 2 that V(tk,a+N)V(t_{k},a+N) is a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme such that i[N]H(Pi)=N\sum_{i\in[N]}H(P_{i})=N, i[K]j[|Ti|]H(Si,j)=a\sum_{i\in[K]}\sum_{j\in[|T_{i}|]}H(S_{i,j})=a, and we have an upper bound of the infimum of the average information ratio σ~N,𝒯|𝒯|/maxi[K](min(ti,|Ti|)),\tilde{\sigma}_{N,\mathcal{T}}\leq{|\mathcal{T}|}/{\max_{i\in[K]}(\min(t_{i},|T_{i}|))}, which matches lemma 6 and the optimum is obtained.

Theorem 4

The infimum of the average information ratio is decided by a specific access structure sub-array, more specifically,

σ~N,𝒯=|𝒯|maxi[K](min(ti,|Ti|)),\displaystyle\tilde{\sigma}_{N,\mathcal{T}}=\frac{|\mathcal{T}|}{\max_{i\in[K]}(\min(t_{i},|T_{i}|))}, (21)

when under the weak secure condition.

Proof:

The proof follows from the above illustrations. ∎

Remark 17

From this criteria of efficiency of a multiple threshold scheme with the weak secure condition, we can learn that for a unique threshold value tt, the number of secrets corresponding to tt is best controlled within tt. And compared to the strong secure condition, weak one improves the performance by a factor related to the number of secrets, which is also limited by the threshold value.

Theorem 5

As for the information ratio, we obtain the optimal results in three cases only:

  1. 1.

    When |Ti|ti,i[K]|T_{i}|\leq t_{i},\forall i\in[K], σN,𝒯=K\sigma_{N,\mathcal{T}}=K.

  2. 2.

    When |Ti|ti,i[K]|T_{i}|\geq t_{i},\forall i\in[K], σN,𝒯=i[K]|Ti|/ti\sigma_{N,\mathcal{T}}=\sum_{i\in[K]}|T_{i}|/t_{i}.

  3. 3.

    When there exists only one index i[K]i\in[K] such that |Ti|>ti|T_{i}|>t_{i}, σN,𝒯=max(K,K1+|Tk|/tk+(i[k+1:K]|Ti|ti)/tk)\sigma_{N,\mathcal{T}}=\max(K,K-1+|T_{k}|/t_{k}+(\sum_{i\in[k+1:K]}|T_{i}|-t_{i})/t_{k}).

Proof:

The proof follows from the following illustrations. ∎

In the first case consider different-threshold-bound (16) only, based on which the derivation of the lower bound for the infimum of the information ratio is carried in the following:

Kmink[K],j[|Tk|]H(Sk,j)k[K]H(Sk,jk)H(Pi)maxi[N]H(Pi),\displaystyle K\min_{k\in[K],j\in[|T_{k}|]}H(S_{k,j})\leq\sum_{k\in[K]}H(S_{k,j_{k}})\leq H(P_{i})\leq\max_{i\in[N]}H(P_{i}), (22)

note that any share index ii is feasible and secret index jkj_{k} is anyone of the set [|Tk|][|T_{k}|] from the sub-array TkT_{k}.

The number of participants is fixed to be NN, and for every sub-array index i[K]i\in[K], introduce an auxiliary access structure array TiT_{i} extracted from the original access structure array 𝒯\mathcal{T}, we have Ti𝒯T_{i}\subseteq\mathcal{T} and V(ti,|Ti|+N)V(t_{i},|T_{i}|+N) is a linear (N,Ti)(N,T_{i}) multiple threshold scheme and also for the structure (N,𝒯)(N,\mathcal{T}) by theorem 2. As the second and third terms of (22) from any such linear scheme are equal. Over a unified finite field whose order is sufficiently large, e.g., bigger than maxi[K]|Ti|+N\max_{i\in[K]}|T_{i}|+N, an independent combination of these KK generator matrices leads to a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme, which facilitates all four terms in (22) to be equal.

Finally we have σN,𝒯=K\sigma_{N,\mathcal{T}}=K when |Ti|ti,i[K]|T_{i}|\leq t_{i},\forall i\in[K], which means for the information ratio criteria, when the number of secrets corresponding to the same threshold value tt is within tt, the number of different threshold values determines the performance.

In the second case we use threshold-product-bound (18) only and apply the same framework above. Similarly for any sub-array index i[K]i\in[K] the generator matrix V(ti,ti+N)V(t_{i},t_{i}+N) is a building block for structure (N,Ti)(N,{T_{i}}) such that both sides of (18) are equal. The KK underlying finite fields are unified with a prime number bigger than maxi[K]ti+N\max_{i\in[K]}t_{i}+N. Note that the length of every share is equal after any combination since each building block guarantees this property.We still need an independent combination of these KK building blocks to make the length of every secret to be equivalent.

An example is that for each i[K]i\in[K], consider (|Ti|ti)\binom{|T_{i}|}{t_{i}} different permutations of secrets from the same sub-array TiT_{i}, then an initial independent combination is a linear (N,Ti)(N,T_{i}) multiple threshold scheme ViV_{i} such that H(Si,j)=(|Ti|1ti1),j[|Ti|]H(S_{i,j})=\binom{|T_{i}|-1}{t_{i}-1},\forall j\in[|T_{i}|] and H(Pj)=(|Ti|ti),j[N]H(P_{j})=\binom{|T_{i}|}{t_{i}},\forall j\in[N]. In this way the length of secrets from any sub-array of the access structure array 𝒯\mathcal{T} are equal. As for all secrets, for any i[K]i\in[K] we firstly independently combine the same ViV_{i} for (j[K](|Tj|1tj1))/(|Ti|1ti1)(\prod_{j\in[K]}\binom{|T_{j}|-1}{t_{j}-1})/\binom{|T_{i}|-1}{t_{i}-1} times to get ViV_{i}^{\prime}, then the final independent combination is carried on {V1,,VK}\{V_{1}^{\prime},\ldots,V_{K}^{\prime}\} directly.

At last we have σN,𝒯=i[K]|Ti|/ti\sigma_{N,\mathcal{T}}=\sum_{i\in[K]}|T_{i}|/t_{i} when |Ti|ti,i[K]|T_{i}|\geq t_{i},\forall i\in[K], which means for the information ratio criteria, when the number of secrets corresponding to the same threshold value tt is bigger than tt, the influence is individual for different kinds of threshold values, and the more secrets, the less efficiency.

Before introducing the last case, a new special linear scheme needs to be illustrated.

Lemma 8

For the structure (N,𝒯=(T1,T2))(N,\mathcal{T}=(T_{1},T_{2})) such that |T1|>t1>t2>|T2||T_{1}|>t_{1}>t_{2}>|T_{2}|, there exists a linear multiple threshold scheme B(N,T1,T2)B(N,T_{1},T_{2}) satisfying H(S1,j)=t2|T2|,j[|T1|]H(S_{1,j})=t_{2}-|T_{2}|,\forall j\in[|T_{1}|], H(S2,j)=|T1|t1,j[|T2|]H(S_{2,j})=|T_{1}|-t_{1},\forall j\in[|T_{2}|] and H(Pj)=t2|T2|+|T1|t1,j[N]H(P_{j})=t_{2}-|T_{2}|+|T_{1}|-t_{1},\forall j\in[N]. The number of rows of B(N,T1,T2)B(N,T_{1},T_{2}) is |T1|t2t1|T2||T_{1}|t_{2}-t_{1}|T_{2}| and the order of the underlying finite field is bigger than max((|T1|+N)(t2|T2|),N(|T1|t1))\max((|T_{1}|+N)(t_{2}-|T_{2}|),N(|T_{1}|-t_{1})) and needs to be sufficiently large based on the weak secure condition for secrets in 𝒯2\mathcal{T}_{2} as will be shown in the proof. The specific form of B(N,T1,T2)B(N,T_{1},T_{2}) needs the help of V(|T1|t2t1|T2|,[(|T1|+N)(t2|T2|)])V(|T_{1}|t_{2}-t_{1}|T_{2}|,[(|T_{1}|+N)(t_{2}-|T_{2}|)]) and V((|T1|t1)t2,[N(|T1|t1)])V((|T_{1}|-t_{1})t_{2},[N(|T_{1}|-t_{1})]). The former can be divided into |T1|+N|T_{1}|+N sub-matrices each with t2|T2|t_{2}-|T_{2}| columns, then the first |T1||T_{1}| ones correspond to secrets from the sub-array T1T_{1} and the last NN ones are part of the shares. Similarly the latter can be divided into NN sub-matrices each with |T1|t1|T_{1}|-t_{1} columns, stack the ii-th sub-matrix with an all-zero one vertically to be a matrix with |T1|t2t1|T2||T_{1}|t_{2}-t_{1}|T_{2}| rows, and then stack the the former part and this matrix horizontally, we get the sub-matrix corresponding to the ii-th share. Finally consider an identity matrix with |T2|(|T1|t1)|T_{2}|(|T_{1}|-t_{1}) columns, stack it with an all-zero matrix vertically to have |T1|t2t1|T2||T_{1}|t_{2}-t_{1}|T_{2}| rows, then the matrix can be divided into |T2||T_{2}| sub-matrices each with |T1|t1|T_{1}|-t_{1} columns and these matrices correspond to secrets from the sub-array T2T_{2}. For example,

B(3,(3,3,3,3),(2))=[1111111111112340516273122324205206207201233343053063073012434440540640740].B(3,(3,3,3,3),(2))=\setcounter{MaxMatrixCols}{11}\begin{bmatrix}1&1&1&1&1&1&1&1&1&1&1\\ 1&2&3&4&0&5&1&6&2&7&3\\ 1&2^{2}&3^{2}&4^{2}&0&5^{2}&0&6^{2}&0&7^{2}&0\\ 1&2^{3}&3^{3}&4^{3}&0&5^{3}&0&6^{3}&0&7^{3}&0\\ 1&2^{4}&3^{4}&4^{4}&0&5^{4}&0&6^{4}&0&7^{4}&0\end{bmatrix}. (23)
Proof:

The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix B-E. ∎

Remark 18

This construction is novel and plays an important role for the information ratio and the (average) randomness ratio.

For the third case, both different-threshold-bound (16) and threshold-sum-difference-bound (17) are considered. In this case assume that |Tk|>tk,k[K]|T_{k}|>t_{k},k\in[K] and |Ti|ti,i[K]/{k}|T_{i}|\leq t_{i},\forall i\in[K]/\{k\}, then we combine the two terms of the information ratio with threshold-sum-difference-bound (17) targeted on kk:

((K1)tk+|Tk|+i[k+1:K]|Ti|ti)mink[K],j[|Tk|]H(Sk,j)\displaystyle((K-1)t_{k}+|T_{k}|+\sum_{i\in[k+1:K]}|T_{i}|-t_{i})\min_{k\in[K],j\in[|T_{k}|]}H(S_{k,j})\leq (24)
tki[k1]H(Si,ji)+i[k:K]j[|Ti|]H(Si,j)+i[k+1:K](tkti)H(Si,ji)\displaystyle t_{k}\sum_{i\in[k-1]}H(S_{i,j_{i}})+\sum_{i\in[k:K]}\sum_{j\in[|T_{i}|]}H(S_{i,j})+\sum_{i\in[k+1:K]}(t_{k}-t_{i})H(S_{i,j_{i}}) (25)
j[tk]H(Pij)tkmaxi[N]H(Pi),\displaystyle\leq\sum_{j\in[t_{k}]}H(P_{i_{j}})\leq t_{k}\max_{i\in[N]}H(P_{i}), (26)

the declaration of jij_{i} and iji_{j} follows (17).

Then we prepare a linear scheme for the structure (N,𝒯)(N,\mathcal{T}) by independent combination like above. For any i[k1]i\in[k-1] the generator matrix V(ti,|Ti|+N)V(t_{i},|T_{i}|+N) is a building block for structure (N,Ti)(N,{T_{i}}) such that both sides of (18) or (17) are equal, so are the building block B(N,Tk,Ti),i[k+1:K]B(N,T_{k},T_{i}),i\in[k+1:K] for the structure (N,(Tk,Ti))(N,(T_{k},T_{i})) when |Ti|<ti|T_{i}|<t_{i} and the building block V(ti,[ti+N])V(t_{i},[t_{i}+N]) for the structure (N,Ti)(N,T_{i}) if |Ti|=ti|T_{i}|=t_{i}. As the value of i[k+1:K]ti|Ti|\sum_{i\in[k+1:K]}t_{i}-|T_{i}| minus |Tk|tk|T_{k}|-t_{k} cased by the latter KkK-k generator matrices may not be zero. We introduce two more pattern building blocks in order to make the length of every secret to be equivalent, i.e., the generator matrix V(tk,tk+N)V(t_{k},t_{k}+N) for the structure (N,Tk)(N,T_{k}), it only fulfills threshold-sum-difference-bound (17), and the generator matrix V(ti,|Ti|+N),i[k+1:K]V(t_{i},|T_{i}|+N),i\in[k+1:K] for structure (N,Ti)(N,{T_{i}}) while this only fulfills different-threshold-bound (16) when |Ti|<ti|T_{i}|<t_{i}.

As in the second case the specific combination coefficients are tedious and by the above introduction of four pattern building blocks we give the conclusion directly. If i[k+1:K]ti|Ti||Tk|tk\sum_{i\in[k+1:K]}t_{i}-|T_{i}|\geq|T_{k}|-t_{k}, σN,𝒯=K\sigma_{N,\mathcal{T}}=K; otherwise, σN,𝒯=K1+|Tk|/tk+(i[k+1:K]|Ti|ti)/tk\sigma_{N,\mathcal{T}}=K-1+|T_{k}|/t_{k}+(\sum_{i\in[k+1:K]}|T_{i}|-t_{i})/t_{k}. It means for the information ratio criteria, when the circumstances that the number of secrets corresponding to the same threshold value tt is bigger than tt and less than tt both exist, the optimization is complicated and needs further insight.

IV (Average) randomness ratio

We firstly discuss multiple threshold scheme with the strong secure condition, of which some results can be modified for the weak secure condition.

IV-A strong secure

We firstly discuss a converse result which is fundamental for lower bounds of the (average) randomness ratio when under the strong secure condition.

Lemma 9

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition, it holds that k[K]j[|Tk|]tkH(Sk,j)H(P[N])\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}t_{k}H(S_{k,j})\leq H(P_{[N]}).

Proof:

The proof is based on the mutual information bound as in lemma 1. The detail is in Appendix C-A. ∎

Remark 19

This bound says that when under the strong secure condition, the randomness of any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is at least the sum of the product of length of every secret and the corresponding threshold value. This is implied by the work from [12], while our proof may be more read-friendly due to the building block in lemma 1. Then consider the (average) randomness ratio, for any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme, we apply this bound and it turns out that τN,𝒯k[K]j[|Tk|](tk1)\tau_{N,\mathcal{T}}\geq\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}(t_{k}-1) and τ~N,𝒯|𝒯|(tK1)\tilde{\tau}_{N,\mathcal{T}}\geq|\mathcal{T}|(t_{K}-1), i.e., lower bounds are formed.

As for the achievability part, recall that from one secret to multiple ones, we can imply independent combination of |𝒯||\mathcal{T}| linear threshold schemes to get a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme according to corollary 2. More specifically, given any structure (N,𝒯)(N,\mathcal{T}), we prepare a linear (tk,N,Sk,j)(t_{k},N,S_{k,j}) threshold scheme based on V(tk,[N+1])V(t_{k},[N+1]) for any k[K],j[|Tk|]k\in[K],j\in[|T_{k}|], each of them is also a degradation version of linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition. The independent combination of these |𝒯||\mathcal{T}| generator matrices leads to a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the strong secure condition such that H(Sk,j)=1,k[K],j[|Tk|]H(S_{k,j})=1,\forall k\in[K],j\in[|T_{k}|] and H(P[N])=k[K]j[|Tk|]tkH(P_{[N]})=\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}t_{k}. Then we have τN,𝒯k[K]j[|Tk|](tk1)\tau_{N,\mathcal{T}}\leq\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}(t_{k}-1). We also derive an upper bound for the infimum of the average randomness ratio by a single generator matrix V(tK,[N+1])V(t_{K},[N+1]), i.e., τ~N,𝒯|𝒯|(tK1)\tilde{\tau}_{N,\mathcal{T}}\leq|\mathcal{T}|(t_{K}-1).

Theorem 6

When under the strong secure condition, the infimum of the randomness ratio τN,𝒯=k[K]|Tk|(tk1)\tau_{N,\mathcal{T}}=\sum_{k\in[K]}|T_{k}|(t_{k}-1) and the average randomness ratio τ~N,𝒯=|𝒯|(tK1)\tilde{\tau}_{N,\mathcal{T}}=|\mathcal{T}|(t_{K}-1).

Proof:

The proof follows from the above illustrations. ∎

Remark 20

The novelty of this theorem compared to the known results of [12] is embedding the two criteria, i.e., the average randomness ratio and randomness ratio. Like the average information ratio, a specific threshold value determines the optimal complexity performance by the average randomness ratio criteria. The more secrets, the more complexity.

IV-B weak secure

IV-B1 converse

We firstly discuss some converse results that are fundamental for lower bounds of the (average) randomness ratio when under the weak secure condition.

Lemma 10 (Threshold-Value-Bound)

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the weak secure condition, for any secret index jk[|Tk|]j_{k}\in[|T_{k}|] of the sub-array TkT_{k}, it holds that

k[K]tkH(Sk,jk)H(P[N]).\displaystyle\sum_{k\in[K]}t_{k}H(S_{k,j_{k}})\leq H(P_{[N]}). (27)
Proof:

Recall that the difference between the strong secure condition (3) and the weak one (3) is the knowledge of secrets. More specifically, substitute the secrets H(𝒮k)H(\mathcal{S}_{k}^{\prime}) of the bound in the proof of lemma 9 by a single secret H(Sk,1)H(S_{k,1}), the result follows. ∎

Remark 21

Recall that the access structure array 𝒯\mathcal{T} can be divided into KK different sub-arrays based on KK unique threshold values. In this way threshold-value-bound says that the randomness of any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme is at least the sum of the product of length of different kinds of secret and the corresponding threshold values, which is a weak version of lemma 9 due to the weak secure condition. This bound is novel as we investigate randomness under the weak secure condition. We find that it is crucial for the (average) randomness ratio. Consider the i[K]|Ti|\prod_{i\in[K]}|T_{i}| different permutations of threshold-value-bound, the sum is equivalent to the following bound

k[K]j[|Tk|]tk|Tk|H(Sk,j)H(P[N]).\sum_{k\in[K]}\sum_{j\in[|T_{k}|]}\frac{t_{k}}{|T_{k}|}H(S_{k,j})\leq H(P_{[N]}). (28)

When under the weak secure condition, there is another novel bound similar to threshold-sum-difference-bound (17).

Lemma 11 (Threshold-Sum-Bound)

For any (N,𝒯)(N,\mathcal{T}) multiple threshold scheme with the weak secure condition, fix an index k[K]k\in[K], similar to lemma 3 let index jij_{i} be any element of the set [|Ti|][|T_{i}|], then

i[k1]tiH(Si,ji)+i[k:K]j[|Ti|]H(Si,j)H(P[N]).\sum_{i\in[k-1]}t_{i}H(S_{i,j_{i}})+\sum_{i\in[k:K]}\sum_{j\in[|T_{i}|]}H(S_{i,j})\leq H(P_{[N]}). (29)
Proof:

The proof can be divided into two parts, each results in a special bound. The detail is in Appendix C-B. ∎

Remark 22

We find that it is crucial for the (average) randomness ratio. Consider the total i[k1]|Ti|\prod_{i\in[k-1]}|T_{i}| different permutations of threshold-sum-bound, the sum is equivalent to the following bound

i[k1]j[|Ti|]ti|Ti|H(Si,j)+i[k:K]j[|Ti|]H(Si,j)H(P[N]).\sum_{i\in[k-1]}\sum_{j\in[|T_{i}|]}\frac{t_{i}}{|T_{i}|}H(S_{i,j})+\sum_{i\in[k:K]}\sum_{j\in[|T_{i}|]}H(S_{i,j})\leq H(P_{[N]}). (30)

IV-B2 achievability

Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio.

Recall that linear scheme like V(t,[N+1])V(t,[N+1]) in definition 5 and lemma 7 for multiple threshold scheme under the (strong) weak secure condition is already known by the information theory community, and in the last section we propose a new generator matrix B(N,T1,T2)B(N,T_{1},T_{2}) which can be seen as a modified version of V(t,[N+1])V(t,[N+1]) for specific structure. Here we continue this idea and give the following lemma.

Lemma 12

For the structure (N,𝒯=(T1))(N,\mathcal{T}=(T_{1})) such that |T1|>t1|T_{1}|>t_{1}, there exists a linear multiple threshold scheme A(N,T1,a)A(N,T_{1},a) where integer a[t11]a\in[t_{1}-1] such that H(S1,j)=a,j[|T1|]H(S_{1,j})=a,\forall j\in[|T_{1}|], H(Pij)=a,j[t1a]H(P_{i_{j}})=a,\forall j\in[t_{1}-a] and H(Pij)=|T1|t1+a,j[t1a+1:N]H(P_{i_{j}})=|T_{1}|-t_{1}+a,\forall j\in[t_{1}-a+1:N], here (i1,,iN)(i_{1},\ldots,i_{N}) are NN different values chosen from the set [N][N]. The number of rows of A(N,T1,a)A(N,T_{1},a) is a|T1|a|T_{1}| and the order of the underlying finite field is bigger than max(a(|T1|+N),(Nt1+a)(|T1|t1))\max(a(|T_{1}|+N),(N-t_{1}+a)(|T_{1}|-t_{1})). The specific form of A(N,T1,a)A(N,T_{1},a) needs the help of V(a|T1|,[a(|T1|+N)])V(a|T_{1}|,[a(|T_{1}|+N)]) and V(a(|T1|t1),[(Nt1+a)(|T1|t1)])V(a(|T_{1}|-t_{1}),[(N-t_{1}+a)(|T_{1}|-t_{1})]). The former can be divided into |T1|+N|T_{1}|+N sub-matrices each with aa columns, then the first |T1||T_{1}| ones correspond to secrets from the sub-array T1T_{1}, the next t1at_{1}-a ones for shares {Pi1,,Pit1a}\{P_{i_{1}},\ldots,P_{i_{t_{1}-a}}\} and the last Nt1+aN-t_{1}+a ones are part of the other Nt1+aN-t_{1}+a shares. Similarly the latter can be divided into Nt1+aN-t_{1}+a sub-matrices each with |T1|t1|T_{1}|-t_{1} columns, stack the jj-th sub-matrix with an all-zero one vertically to be a matrix with a|T1|a|T_{1}| rows, and then stack the the former part and this matrix horizontally, we get the sub-matrix corresponding to the it1a+ji_{t_{1}-a+j}-th share. For example,

A(3,(2,2,2),1)=[11111111123450601223242520620].A(3,(2,2,2),1)=\begin{bmatrix}1&1&1&1&1&1&1&1\\ 1&2&3&4&5&0&6&0\\ 1&2^{2}&3^{2}&4^{2}&5^{2}&0&6^{2}&0\end{bmatrix}. (31)
Proof:

The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix C-C. ∎

Remark 23

This construction is novel, has different size of shares and plays the extreme direction role [19] for the projection proj𝐡I(ΓN+|T1|𝒞0,1,3)\text{proj}_{\mathbf{h}_{I}}(\Gamma_{N+|T_{1}|}\cap\mathcal{C}_{0,1,3}) when t1<Nt_{1}<N. When t1=Nt_{1}=N, the cases for a[2:t11]a\in[2:t_{1}-1] are not extreme directions as the threshold-sum-difference-bound (17) is unique, while the case that a=1a=1 is an extreme direction. Recall that for a fixed structure (N,T1)(N,T_{1}) with |T1|>t1|T_{1}|>t_{1}, in the (2N+|T1|1)(2^{N+|T_{1}|}-1)-dimension Euclidean space we denote the coordinates related with NN shares and |T1||T_{1}| secrets by 𝐡I\mathbf{h}_{I}, and the projection is from the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure (N,T1)(N,T_{1}).

Consider the average randomness ratio firstly and there are two cases. Recall that the access structure array 𝒯\mathcal{T} consists of KK sub-arrays.

The first one is that for any structure (N,𝒯)(N,\mathcal{T}) when there at least exists one index i[K]i\in[K] satisfying |Ti|ti|T_{i}|\geq t_{i}. We use threshold-sum-bound (29) for k=1k=1 and have a lower bound of the infimum of the average randomness ratio τ~N,𝒯0\tilde{\tau}_{N,\mathcal{T}}\geq 0. Then the corresponding linear scheme can be A(N,Ti,1)A(N,T_{i},1) or V(ti,[ti+N])V(t_{i},[t_{i}+N]) for the structure (N,𝒯)(N,\mathcal{T}) by theorem 2 and it turns out that τ~N,𝒯0\tilde{\tau}_{N,\mathcal{T}}\leq 0. The optimum is claimed and means that no additional randomness is needed in this case for the weak secure condition.

The second case is the opposite, that is, for every index i[K]i\in[K], the number of secrets corresponding to the same threshold value tit_{i} is less than tit_{i}, i.e., |Ti|<ti|T_{i}|<t_{i}. Use the permutation version of threshold-value-bound (28) we have τ~N,𝒯|𝒯|mini[K](ti|Ti|)/|Ti|\tilde{\tau}_{N,\mathcal{T}}\geq|\mathcal{T}|\cdot\min_{i\in[K]}(t_{i}-|T_{i}|)/|T_{i}|. Assume kk is the index matching this minimum value, a linear scheme V(tk,[|Tk|+N])V(t_{k},[|T_{k}|+N]) for the structure (N,𝒯)(N,\mathcal{T}) leads to the upper bound τ~N,𝒯|𝒯|(tk|Tk|)/|Tk|\tilde{\tau}_{N,\mathcal{T}}\leq|\mathcal{T}|(t_{k}-|T_{k}|)/|T_{k}|. The optimum is claimed and means that under the weak secure condition we can benefit from the number of secrets corresponding to the same threshold value when consider randomness.

Theorem 7

For any structure (N,𝒯)(N,\mathcal{T}), the infimum of the average randomness ratio

τ~N,𝒯=|𝒯|max(mini[K](ti|Ti|)/|Ti|,0).\displaystyle\tilde{\tau}_{N,\mathcal{T}}=|\mathcal{T}|\cdot\max(\min_{i\in[K]}(t_{i}-|T_{i}|)/|T_{i}|,0). (32)
Proof:

The proof follows from the two cases mentioned above. ∎

As for the randomness ratio, still two cases will be discussed.

Similarly the first case is that the number of secrets corresponding to the same threshold value tkt_{k} is bigger than tkt_{k}, fix the smallest index from [K][K] to be kk. Introduce the permutation version of threshold-sum-bound (30) towards kk and we have a lower bound of the infimum of the randomness ratio τN,𝒯i[k1]ti|Ti|\tau_{N,\mathcal{T}}\geq\sum_{i\in[k-1]}t_{i}-|T_{i}|. For any index i[k1]i\in[k-1] we prepare V(ti,[|Ti|+N])V(t_{i},[|T_{i}|+N]) for the structure (N,Ti)(N,T_{i}), the linear scheme A(N,Tk,1)A(N,T_{k},1) is for the structure (N,Tk)(N,T_{k}) and for every index i[k+1]i\in[k+1], if |Ti|<ti|T_{i}|<t_{i}, the generator matrix B(N,Tk,Ti)B(N,T_{k},T_{i}) is used; otherwise, we only prepare A(N,Ti,1)A(N,T_{i},1) or V(ti,[ti+N])V(t_{i},[t_{i}+N]). Let the order be sufficiently large we have a unified finite field, and the independent combination of these generator matrices leads to a linear (N,𝒯)(N,\mathcal{T}) multiple threshold scheme under the weak secure condition such that τN,𝒯i[k1]ti|Ti|\tau_{N,\mathcal{T}}\leq\sum_{i\in[k-1]}t_{i}-|T_{i}|. Finally the optimum is claimed and we can indeed learn that more secrets help to reduce randomness.

The second case is still the opposite, that is, for any index i[K]i\in[K], |Ti|ti|T_{i}|\leq t_{i}. Use the permutation version of threshold-value-bound (28) we have τN,𝒯i[K]ti|Ti|{\tau}_{N,\mathcal{T}}\geq\sum_{i\in[K]}t_{i}-|T_{i}|. We prepare a generator matrix V(ti,[|Ti|+N])V(t_{i},[|T_{i}|+N]) for every sub-array TiT_{i}. Still let the order be sufficiently large, over the unified finite field the independent combination of these KK generator matrices leads to τN,𝒯i[K]ti|Ti|\tau_{N,\mathcal{T}}\leq\sum_{i\in[K]}t_{i}-|T_{i}|. The optimum is claimed.

Theorem 8

For any structure (N,𝒯)(N,\mathcal{T}), the infimum of the randomness ratio

τN,𝒯=i[b]ti|Ti|,\displaystyle{\tau}_{N,\mathcal{T}}=\sum_{i\in[b]}t_{i}-|T_{i}|, (33)

where b depends on the access structure array 𝒯\mathcal{T}. More specifically, if there exists an index k[K]k\in[K] such that |Tk|>tk|T_{k}|>t_{k}, let bb be the smallest such index minus 1; otherwise, b=Kb=K.

Proof:

The proof follows from the two cases mentioned above. ∎

V Conclusions and future direction

TABLE I: four ratios under two secure conditions
strong weak
σ~N,𝒯\tilde{\sigma}_{N,\mathcal{T}} |𝒯||\mathcal{T}| |𝒯|/maxi[K](min(ti,|Ti|))|\mathcal{T}|/\max_{i\in[K]}(\min(t_{i},|T_{i}|))
σN,𝒯{\sigma}_{N,\mathcal{T}} |𝒯||\mathcal{T}| KK
i[K]|Ti|/ti\sum_{i\in[K]}|T_{i}|/t_{i}
max(K,K1+|Tk|/tk+(i[k+1:K]|Ti|ti)/tk)\max(K,K-1+|T_{k}|/t_{k}+(\sum_{i\in[k+1:K]}|T_{i}|-t_{i})/t_{k})
Unknown
τ~N,𝒯\tilde{\tau}_{N,\mathcal{T}} |𝒯|(tK1)|\mathcal{T}|(t_{K}-1) |𝒯|max(mini[K](ti|Ti|)/|Ti|,0)|\mathcal{T}|\cdot\max(\min_{i\in[K]}(t_{i}-|T_{i}|)/|T_{i}|,0)
τN,𝒯{\tau}_{N,\mathcal{T}} k[K]|Tk|(tk1)\sum_{k\in[K]}|T_{k}|(t_{k}-1) i[b]ti|Ti|\sum_{i\in[b]}t_{i}-|T_{i}|

In table I we conclude the results of the four ratios. We can see that when under the weak secure condition, multiple threshold scheme has improved performance of both efficiency and complexity, compared to the strong secure condition.

When under the weak secure condition, we find that these three new bounds come from the case that the number of secrets corresponding to the same threshold value tt is lager than tt. As leaded by corollary 1, we conjecture that the projection proj𝐡I(ΓN+|𝒯|𝒞0,1,3)\text{proj}_{\mathbf{h}_{I}}(\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,3}) may have all patterns of bounds, where N=4N=4, 𝒯=(T1,T2,T3)\mathcal{T}=(T_{1},T_{2},T_{3}) with t1=4,|T1|=5t_{1}=4,|T_{1}|=5, t2=3,|T2|=4t_{2}=3,|T_{2}|=4 and t3=2,|T3|=3t_{3}=2,|T_{3}|=3. However, existing numerical experiments may be difficult to carry on due to the tremendous number of the Shannon-type inequalities involved. So the bound (20) may also be a good direction to attack.

Appendix A proofs for problem formulation

A-A proof of theorem 1

Let 𝒫:=ΓN+|𝒯|𝒞0,1,(2)3\mathcal{P}:=\Gamma_{N+|\mathcal{T}^{\prime}|}\cap\mathcal{C}_{0,1,(2)3}^{\prime} and 𝒬:=proj𝐡L(ΓN+|𝒯|𝒞0,1,(2)3)\mathcal{Q}:=\text{proj}_{\mathbf{h}_{L}}(\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}) for ease of notation.

()(\Rightarrow)Form a set of |𝒯||𝒯||\mathcal{T}|-|\mathcal{T}^{\prime}| excluded secrets B:={Sj:|𝒯|+1j|𝒯|}B:=\{S_{j}:|\mathcal{T}^{\prime}|+1\leq j\leq|\mathcal{T}|\} and recall that 𝒪\mathcal{O} is the set of N+|𝒯|N+|\mathcal{T}| random variables. For any vector 𝐱𝒫\mathbf{x}\in\mathcal{P}, there exists a vector 𝐗N+|𝒯|\mathbf{X}\in\mathcal{H}_{N+|\mathcal{T}|} such that 𝐗𝐡L=𝐱\mathbf{X}_{\mathbf{h}_{L}}=\mathbf{x}, where 𝐗𝐡L\mathbf{X}_{\mathbf{h}_{L}} is a vector extracted from the original vector 𝐗\mathbf{X} according to the coordinates of the region 𝒫\mathcal{P}. More specifically, for any non-empty a𝒪a\subseteq\mathcal{O}, let Xa=xa/BX_{a}=x_{a/B}, where x=0x_{\emptyset}=0 and // means the difference of two sets, in this way it follows that 𝐗𝐡L=𝐱\mathbf{X}_{\mathbf{h}_{L}}=\mathbf{x}. The vector 𝐗\mathbf{X} satisfies the Shannon-type inequalities since for ab𝒪a\subseteq b\subseteq\mathcal{O}, Xb=xb/Bxa/B=XaX_{b}=x_{b/B}\geq x_{a/B}=X_{a} and for a,b𝒪a,b\subseteq\mathcal{O}, Xa+Xb=xa/B+xb/Bxab/B+xab/B=Xab+XabX_{a}+X_{b}=x_{a/B}+x_{b/B}\geq x_{a\cup b/B}+x_{a\cap b/B}=X_{a\cup b}+X_{a\cap b}. 𝐗𝒞0\mathbf{X}\in\mathcal{C}_{0} because XS1,,S|𝒯|=xS1,,S|𝒯|=i[|𝒯|]xi=i[|𝒯|]XiX_{S_{1},\ldots,S_{|\mathcal{T}|}}=x_{S_{1},\ldots,S_{|\mathcal{T}^{\prime}|}}=\sum_{i\in[|\mathcal{T}^{\prime}|]}x_{i}=\sum_{i\in[|\mathcal{T}|]}X_{i}. With the degeneration of the secrets in the set BB from the construction of the vector XX and by the definitions of decodable condition and (strong) weak condition similar to the independent assumption of all secrets, we have 𝐗𝒞1,(2)3\mathbf{X}\in\mathcal{C}_{1,(2)3}. Finally, 𝐱𝒫,𝐱𝒬\forall\mathbf{x}\in\mathcal{P},\mathbf{x}\in\mathcal{Q}.

()(\Leftarrow)For any vector 𝐗ΓN+|𝒯|𝒞0,1,(2)3\mathbf{X}\in\Gamma_{N+|\mathcal{T}|}\cap\mathcal{C}_{0,1,(2)3}, from which extract a vector 𝐱\mathbf{x} according to the coordinates of the region 𝒫\mathcal{P}. As 𝐗\mathbf{X} satisfies the Shannon-type inequalities for N+|𝒯|N+|\mathcal{T}| random variables, it follows that 𝐱ΓN+|𝒯|\mathbf{x}\in\Gamma_{N+|\mathcal{T}^{\prime}|} by the definitions of non-decreasing and submodular properties. With the help of the Shannon-type inequalities, we have XS[|𝒯|]+j=|𝒯|+1j=|𝒯|XSjXS[|𝒯|]=j[|𝒯|]XSjX_{S_{[|\mathcal{T}^{\prime}|]}}+\sum_{j=|\mathcal{T}^{\prime}|+1}^{j=|\mathcal{T}|}X_{S_{j}}\geq X_{S_{[|\mathcal{T}|]}}=\sum_{j\in[|\mathcal{T}|]}X_{S_{j}} and j[|𝒯|]XSjXS[|𝒯|]\sum_{j\in[|\mathcal{T}^{\prime}|]}X_{S_{j}}\geq X_{S_{[|\mathcal{T}^{\prime}|]}}, then 𝐱𝒞0\mathbf{x}\in\mathcal{C}_{0}^{\prime}. For abc𝒪a\subseteq b\subseteq c\subseteq\mathcal{O}, similarly we have XcXaXbXaX_{c}-X_{a}\geq X_{b}-X_{a} and when XcXa=0X_{c}-X_{a}=0, it follows that XbXa=0X_{b}-X_{a}=0, then 𝐱𝒞1\mathbf{x}\in\mathcal{C}_{1}^{\prime}. For three disjoint sets a,b,c𝒪a,b,c\subseteq\mathcal{O}, we have Xa,b+Xa,cXa,b,c+XcX_{a,b}+X_{a,c}\geq X_{a,b,c}+X_{c} and when Xa,b,c=Xa,b+XcX_{a,b,c}=X_{a,b}+X_{c}, it follows that Xa,c=Xa+XcX_{a,c}=X_{a}+X_{c}, then if we consider the strong secure condition, 𝐱𝒞2\mathbf{x}\in\mathcal{C}_{2}^{\prime}. The case of 𝒞3\mathcal{C}_{3}^{\prime} follows for reasons similar to the Shannon-type inequalities for different numbers of random variables above. Hence we have 𝐱𝒬,𝐱𝒫\forall\mathbf{x}\in\mathcal{Q},\mathbf{x}\in\mathcal{P}.

A-B proof of theorem 2

Note that we have assumed all vectors of any sub-matrix ViV_{i} of a generator matrix are linear independent, if ViV_{i} is all-zero, we call such matrix a dummy one since rk(Vi)=0\text{rk}(V_{i})=0. Form a set of |𝒯||𝒯||\mathcal{T}|-|\mathcal{T}^{\prime}| excluded secrets B:={Sj:j[|𝒯|+1,|𝒯|]}B:=\{S_{j}:j\in[|\mathcal{T}^{\prime}|+1,|\mathcal{T}|]\}. We have already known that the generator matrix VV satisfies the system conditions of the structure (N,𝒯)(N,\mathcal{T}^{\prime}), and we will show that after the construction of dummy matrices for the set of excluded secrets BB, VV is also for (N,𝒯)(N,\mathcal{T}).

For the independent assumption of secrets, rk(VS[|𝒯|])=rk(VS[|𝒯|])=i[|𝒯|]rk(VSi)=i[|𝒯|]rk(VSi)\text{rk}(V_{S_{[|\mathcal{T}|]}})=\text{rk}(V_{S_{[|\mathcal{T}^{\prime}|]}})=\sum_{i\in[|\mathcal{T}^{\prime}|]}\text{rk}(V_{S_{i}})=\sum_{i\in[|\mathcal{T}|]}\text{rk}(V_{S_{i}}), the first equation is from the all-zero matrices, the second is by the property of VV and the third is still via the dummy construction. If we have rk(VSC,PA)=rk(VPA),A[N],C[|𝒯|]\text{rk}(V_{{S}_{C},P_{A}})=\text{rk}(V_{P_{A}}),A\subseteq[N],C\subseteq[|\mathcal{T}^{\prime}|] under the decodable condition, from the dummy construction it follows that rk(VSB,SC,PA)=rk(VSC,PA)=rk(VPA)\text{rk}(V_{S_{B},{S}_{C},P_{A}})=\text{rk}(V_{{S}_{C},P_{A}})=\text{rk}(V_{P_{A}}), which is enough for the structure (N,𝒯)(N,\mathcal{T}). Similarly consider the (strong) weak secure condition, if rk(VSC,PA)=rk(VPA)+rk(VSc),A[N],C[|𝒯|]\text{rk}(V_{{S}_{C},P_{A}})=\text{rk}(V_{P_{A}})+\text{rk}(V_{S_{c}}),A\subseteq[N],C\subseteq[|\mathcal{T}^{\prime}|], as the additional matrices are all-zero, rk(VSB,SC,PA)=rk(VSC,PA)=rk(VPA)+rk(VSB,Sc)\text{rk}(V_{S_{B},{S}_{C},P_{A}})=\text{rk}(V_{{S}_{C},P_{A}})=\text{rk}(V_{P_{A}})+\text{rk}(V_{S_{B},S_{c}}), which is also sufficient.

Appendix B proofs for (average) information ratio

B-A proof of lemma 2

Recall that the access structure array 𝒯\mathcal{T} has KK sub-arrays, each of them is denoted by TkT_{k} full of tkt_{k}, the same threshold value of the corresponding set of secrets 𝒮k={Sk,1,,Sk,|Tk|}\mathcal{S}_{k}=\{S_{k,1},\ldots,S_{k,|T_{k}|}\}. In this way the non-increasing property of 𝒯\mathcal{T} says that t1>>tKt_{1}>\cdots>t_{K}.

Based on corollary 1, we introduce an auxiliary access structure array 𝒯𝒯\mathcal{T}^{\prime}\supseteq\mathcal{T}. More specifically, 𝒯\mathcal{T}^{\prime} has t11t_{1}-1 sub-arrays with t1=t1,t2=t11,,tt11=2t_{1}^{\prime}=t_{1},t_{2}^{\prime}=t_{1}-1,\ldots,t_{t_{1}-1}^{\prime}=2, and the length of each is larger than or equal to the corresponding sub-array of 𝒯\mathcal{T}, i.e., for any k[t11]k\in[t_{1}-1], if there exists j[K]j\in[K] such that tk=tjt_{k}^{\prime}=t_{j}, then |Tk|=|Tj||T_{k}^{\prime}|=|T_{j}|; otherwise, |Tk|=1|T_{k}^{\prime}|=1. Then our proof is towards the structure (N,𝒯)(N,\mathcal{T}^{\prime}), and the result for the structure (N,𝒯)(N,\mathcal{T}) will be obtained from truncation.

For any k[2:t11]k\in[2:t_{1}-1], from the strong secure condition (3), for all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}^{\prime}-1, we have that H(𝒮k|PA)=H(𝒮k)H(\mathcal{S}_{k}^{\prime}|P_{A})=H(\mathcal{S}_{k}^{\prime}); and from the decodable condition (2), for all B[N]B\subseteq[N] with |B|tk|B|\geq t_{k}^{\prime}, it holds that H(𝒮k|PB)=0H(\mathcal{S}_{k}^{\prime}|P_{B})=0. Substitute the single secret SS from lemma 1 by the set of secrets 𝒮k\mathcal{S}_{k}^{\prime}, we have

H(𝒮k)I(P1;Pt1k+2|P2,,Pt1k+1),H(\mathcal{S}_{k}^{\prime})\leq I(P_{1};P_{t_{1}-k+2}|P_{2},\ldots,P_{t_{1}-k+1}),

where we use the relation that tk=t1k+1t_{k}^{\prime}=t_{1}-k+1 due to the continuous nature.

And the boundary case is that

H(𝒮1)H(P1|P2,,Pt1).H(\mathcal{S}_{1}^{\prime})\leq H(P_{1}|P_{2},\ldots,P_{t_{1}}).

Sum these t11t_{1}-1 inequalities together, we have k[t11]H(𝒮k)H(P1|P2)H(P1)\sum_{k\in[t_{1}-1]}H(\mathcal{S}_{k}^{\prime})\leq H(P_{1}|P_{2})\leq H(P_{1}). From the assumption that all secrets all statistically independent, the permutation of the indices of shares as mentioned in the proof of lemma 1 and the truncation technique from corollary 1, the final result follows.

B-B proof of lemma 4

Still we use plain number instead of index like j1j_{1} as in the proof of lemma 1 for simplicity, and an auxiliary access structure array 𝒯𝒯\mathcal{T}^{\prime}\supseteq\mathcal{T} is introduced like the proof in lemma 2. More specifically, the access structure array 𝒯\mathcal{T}^{\prime} consists of t11t_{1}-1 continuous natural numbers from t1t_{1} to 22, we replace the starting index 11 by k+tkt1k+t_{k}-t_{1}, i.e., tk+tkt1=t1,,tk+tk2=2t_{k+t_{k}-t_{1}}^{\prime}=t_{1},\ldots,t_{k+t_{k}-2}^{\prime}=2, in this way we have tk=tkt_{k}^{\prime}=t_{k} from the relation ti=k+tkit_{i}^{\prime}=k+t_{k}-i. Fix an index k[K]k\in[K], three parts of inequalities will be presented.

The first part is about the right hand side of secrets 𝒮k\mathcal{S}_{k}^{\prime}, based on the bound of lemma 1, for any index i[k+1:k+tk2]i\in[k+1:k+t_{k}-2], we prepare iki-k inequalities in the following:

H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P1;Pk+tki+1|P2,,Pk+tki),\displaystyle\leq I(P_{1};P_{k+t_{k}-i+1}|P_{2},\ldots,P_{k+t_{k}-i}),
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P2;Pk+tki+2|P3,,Pk+tki+1),\displaystyle\leq I(P_{2};P_{k+t_{k}-i+2}|P_{3},\ldots,P_{k+t_{k}-i+1}),
\displaystyle\cdots
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(Pik;Ptk|Pik+1,,Ptk1).\displaystyle\leq I(P_{i-k};P_{t_{k}}|P_{i-k+1},\ldots,P_{t_{k}-1}).

Then the sum of these i=k+1k+tk2(ik)\sum_{i=k+1}^{k+t_{k}-2}(i-k) inequalities leads to the following bound

i=k+1k+tk2(ik)H(Si,1)i[tk2]H(Pi|Pi+1)+H(Ptk1,Ptk)H(P[tk]).\sum_{i=k+1}^{k+t_{k}-2}(i-k)H(S_{i,1}^{\prime})\leq\sum_{i\in[t_{k}-2]}H(P_{i}|P_{i+1})+H(P_{t_{k}-1},P_{t_{k}})-H(P_{[t_{k}]}). (34)

Note that tkti=ikt_{k}^{\prime}-t_{i}^{\prime}=i-k, H(Pi|Pi+1)H(Pi)H(P_{i}|P_{i+1})\leq H(P_{i}) and H(Ptk1,Ptk)H(Ptk1)+H(Ptk)H(P_{t_{k}-1},P_{t_{k}})\leq H(P_{t_{k}-1})+H(P_{t_{k}}). This concludes the first part and note that if the initial choose tkt_{k} equals the last element of the auxiliary access structure array 𝒯\mathcal{T}^{\prime}, i.e., 22, this part is ignored.

The second part includes the secrets 𝒮k\mathcal{S}_{k}^{\prime} compared to the fist part, i.e., the secrets 𝒮[k:k+tk2]\mathcal{S}_{[k:k+t_{k}-2]}^{\prime} are considered here. When N>tkN>t_{k}, based on the non-negativeness of conditional mutual information, we list tkt_{k} inequalities in the following:

I(P1;P2,,Ptk+1|𝒮[k:k+tk2])\displaystyle I(P_{1};P_{2},\ldots,P_{t_{k}+1}|\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0,\displaystyle\geq 0,
I(P2;P3,,Ptk+1|P1,𝒮[k:k+tk2])\displaystyle I(P_{2};P_{3},\ldots,P_{t_{k}+1}|P_{1},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0,\displaystyle\geq 0,
\displaystyle\cdots
I(Ptk;Ptk+1|P1,,Ptk1𝒮[k:k+tk2])\displaystyle I(P_{t_{k}};P_{t_{k}+1}|P_{1},\ldots,P_{t_{k}-1}\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0.\displaystyle\geq 0.

Consider the sum of these tkt_{k} inequalities and recall the decodable condition (2), substitute H(P1,Ptk,𝒮[k:k+tk2])H(P_{1},\ldots P_{t_{k}},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) by H(P1,Ptk)H(P_{1},\ldots P_{t_{k}}), for any i[tk]i\in[t_{k}] replace the conditional entropy H(Pi|P[tk+1]/{i},𝒮[k:k+tk2])H(P_{i}|P_{[t_{k}+1]/\{i\}},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) by H(Pi|P[tk+1]/{i})H(P_{i}|P_{[t_{k}+1]/\{i\}}), and via the independent assumption of secrets (1) we finally have

i[k:k+tk2]j|Ti|H(Si,j)H(P[tk])i[tk]H(Pi|P[tk+1]/{i}).\sum_{i\in[k:k+t_{k}-2]}\sum_{j\in|T_{i}^{\prime}|}H(S_{i,j}^{\prime})\leq H(P_{[t_{k}]})-\sum_{i\in[t_{k}]}H(P_{i}|P_{[t_{k}+1]/\{i\}}). (35)

When N=tkN=t_{k} we use i[k:k+tk2]j|Ti|H(Si,j)H(P[tk])\sum_{i\in[k:k+t_{k}-2]}\sum_{j\in|T_{i}^{\prime}|}H(S_{i,j}^{\prime})\leq H(P_{[t_{k}]}) by the decodable condition directly.

The third part considers the rest secrets, i.e., 𝒮[k+tkt1:k1]\mathcal{S}_{[k+t_{k}-t_{1}:k-1]}^{\prime}. Still based on the bound of lemma 1, for any index i[k+tkt1+1:k1]i\in[k+t_{k}-t_{1}+1:k-1], tkt_{k} inequalities are prepared in the following:

H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P1;Pk+tki+1|P[tk]/{1},Ptk+1,,Pk+tki),\displaystyle\leq I(P_{1};P_{k+t_{k}-i+1}|P_{[t_{k}]/\{1\}},P_{t_{k}+1},\ldots,P_{k+t_{k}-i}),
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P2;Pk+tki+1|P[tk]/{2},Ptk+1,,Pk+tki),\displaystyle\leq I(P_{2};P_{k+t_{k}-i+1}|P_{[t_{k}]/\{2\}},P_{t_{k}+1},\ldots,P_{k+t_{k}-i}),
\displaystyle\cdots
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(Ptk;Pk+tki+1|P[tk]/{tk},Ptk+1,,Pk+tki).\displaystyle\leq I(P_{t_{k}};P_{k+t_{k}-i+1}|P_{[t_{k}]/\{t_{k}\}},P_{t_{k}+1},\ldots,P_{k+t_{k}-i}).

For the boundary case i=k+tkt1i=k+t_{k}-t_{1}, we introduce tkt_{k} conditional entropy bounds instead of conditional mutual information ones like the boundary part in the proof of lemma 2.

H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(P1|P[tk]/{1},Ptk+1,,Pt1),\displaystyle\leq H(P_{1}|P_{[t_{k}]/\{1\}},P_{t_{k}+1},\ldots,P_{t_{1}}),
H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(P2|P[tk]/{2},Ptk+1,,Pt1),\displaystyle\leq H(P_{2}|P_{[t_{k}]/\{2\}},P_{t_{k}+1},\ldots,P_{t_{1}}),
\displaystyle\cdots
H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(Ptk|P[tk]/{tk},Ptk+1,,Pt1).\displaystyle\leq H(P_{t_{k}}|P_{[t_{k}]/\{t_{k}\}},P_{t_{k}+1},\ldots,P_{t_{1}}).

Then the sum of these (t1tk)tk(t_{1}-t_{k})t_{k} inequalities leads to the following bound

tki=k+tkt1k1H(Si,1)i[tk]H(Pi|P[tk+1]/{i}).t_{k}\sum_{i=k+t_{k}-t_{1}}^{k-1}H(S_{i,1}^{\prime})\leq\sum_{i\in[t_{k}]}H(P_{i}|P_{[t_{k}+1]/\{i\}}). (36)

This concludes the third part and note that if the initial choose tkt_{k} equals the first element of the auxiliary access structure array 𝒯\mathcal{T}^{\prime}, i.e., t1t_{1}, or k=1k=1 for short, this part is ignored.

From the permutation of the indices of shares as mentioned in the proof of lemma 1 and the truncation technique from corollary 1, the final result follows by the sum of these three parts.

B-C proof of lemma 5

Recall that the access structure array 𝒯\mathcal{T} has KK sub-arrays, if K=1K=1, this bound follows by H(𝒮1,P[t1])=H(P[t1])H(𝒮1)H(\mathcal{S}_{1},P_{[t_{1}]})=H(P_{[t_{1}]})\geq H(\mathcal{S}_{1}).

When K2K\geq 2, we introduce an auxiliary access structure array 𝒯𝒯\mathcal{T}^{\prime}\supseteq\mathcal{T} as in lemma 2. More specifically, 𝒯\mathcal{T}^{\prime} has t11t_{1}-1 sub-arrays with t1=t1,t2=t11,,tt11=2t_{1}^{\prime}=t_{1},t_{2}^{\prime}=t_{1}-1,\ldots,t_{t_{1}-1}^{\prime}=2, and the length of each is larger than or equal to the corresponding sub-array of 𝒯\mathcal{T}, i.e., for any k[t11]k\in[t_{1}-1], if there exists j[K]j\in[K] such that tk=tjt_{k}^{\prime}=t_{j}, then |Tk|=|Tj||T_{k}^{\prime}|=|T_{j}|; otherwise, |Tk|=1|T_{k}^{\prime}|=1. Then our proof is towards the structure (N,𝒯)(N,\mathcal{T}^{\prime}), and the result for the structure (N,𝒯)(N,\mathcal{T}) will be obtained from truncation and dividing the same positive integer in both sides of the inequality.

For every k[2:t11]k\in[2:t_{1}-1], we prepare a pattern inequality which is rewritten from the bound (35), one of the three ingredients for the threshold-sum-difference-bound:

tkH(P[tk+1])+H(𝒮[k:t11])i[tk+1]H(P[tk+1]/{i}).t_{k}^{\prime}H(P_{[t_{k}^{\prime}+1]})+H(\mathcal{S}_{[k:t_{1}-1]}^{\prime})\leq\sum_{i\in[t_{k}^{\prime}+1]}H(P_{[t_{k}^{\prime}+1]/\{i\}}). (37)

The core idea is that special permutations of every pattern inequality except the first one are summed to cancel the entropies of shares. More specifically, the term H(P[tk+1])H(P_{[t_{k}^{\prime}+1]}) can be permuted to cancel the term i[tk1+1]H(P[tk1+1]/{i})\sum_{i\in[t_{k-1}^{\prime}+1]}H(P_{[t_{k-1}^{\prime}+1]/\{i\}}) of a new pattern inequality ahead, also this pattern inequality for k1k-1 can be multiplied to maintain integral coefficients. Such induction procedure leads to

k[2:t11]kH(P[t1])+i[2:t11]k[2:t1]kti1tiH(𝒮[i:t11])k[2:t11]ki[t1]H(Pi).\displaystyle\prod_{k\in[2:t_{1}-1]}kH(P_{[t_{1}]})+\sum_{i\in[2:t_{1}-1]}\frac{\prod_{k\in[2:t_{1}]}k}{t_{i-1}t_{i}}H(\mathcal{S}_{[i:t_{1}-1]}^{\prime})\leq\prod_{k\in[2:t_{1}-1]}k\sum_{i\in[t_{1}]}H(P_{i}). (38)

Note that similar to the case K=1K=1, H(P[t1])H(𝒮[t11])H(P_{[t_{1}]})\geq H(\mathcal{S}_{[t_{1}-1]}^{\prime}), due to the assumption of mutually independent secrets, the permutation of indices of NN shares and the truncation technique from corollary 1, the final result follows.

B-D proof of lemma 6

The proof is carried via case analysis where two cases are involved.

The first case is that for every i[K]i\in[K], the length of the sub-array TiT_{i} is not bigger than the unique threshold value tit_{i} of it, i.e., |Ti|ti|T_{i}|\leq t_{i}. Assume maxi[K](|Ti|)=|Tk|\max_{i\in[K]}(|T_{i}|)=|T_{k}|, then we introduce an auxiliary access structure array 𝒯\mathcal{T}^{\prime} such that i[K],|Ti|=|Tk|,ti=ti\forall i\in[K],|T_{i}^{\prime}|=|T_{k}|,t_{i}^{\prime}=t_{i}. Note that the number of all different different-threshold-bounds (16) is N|Tk|KN|T_{k}|^{K}, the sum of them is the following:

N|Tk|K1i[K]j[|Tk|]H(Si,j)|Tk|Ki[N]H(Pi).\displaystyle N|T_{k}|^{K-1}\sum_{i\in[K]}\sum_{j\in[|T_{k}|]}H(S_{i,j}^{\prime})\leq|T_{k}|^{K}\sum_{i\in[N]}H(P_{i}).

Based on the technique of truncation as in corollary 1 we have σ~N,𝒯|𝒯|/|Tk|\tilde{\sigma}_{N,\mathcal{T}}\geq{|\mathcal{T}|}/{|T_{k}|}.

Another case is the opposite, i.e., there at least exists one sub-array such that the length of it is strictly bigger than the corresponding threshold value, assume the first one is TkT_{k} and then |Ti|ti,i[k1]|T_{i}|\leq t_{i},i\in[k-1] where [0][0] is the empty set. In this way let a=max(|T1|,,|Tk1|,tk)a=\max(|T_{1}|,\ldots,|T_{k}-1|,t_{k}) and due to the non-increasing assumption of the access structure array it follows that for any i[k+1:K]i\in[k+1:K], amin(ti,|Ti|)a\geq\min(t_{i},|T_{i}|). The auxiliary access structure array 𝒯\mathcal{T}^{\prime} is constructed similarly, |Ti|=a,i[k1],|Ti|=|Ti|,i[k:K]|T_{i}^{\prime}|=a,i\in[k-1],|T_{i}^{\prime}|=|T_{i}|,i\in[k:K] and the KK unique threshold values are the same. We only use the first two parts in the left hand side of threshold-sum-difference-bound (17), i.e., such relaxation ignores the difference part. Consider the permutation of secrets firstly, the sum of ak1a^{k-1} such inequalities for fixed tkt_{k} different shares is the following:

tkak2i[k1]j[|Ti|]H(Si,j)+ak1i[k:K]j[|Ti|]H(Si,j)ak1i[tk]H(Pi),\displaystyle t_{k}a^{k-2}\sum_{i\in[k-1]}\sum_{j\in[|T_{i}|]}H(S_{i,j}^{\prime})+a^{k-1}\sum_{i\in[k:K]}\sum_{j\in[|T_{i}|]}H(S_{i,j}^{\prime})\leq a^{k-1}\sum_{i\in[t_{k}]}H(P_{i}),

note that when k=1k=1, the first part in the left hand side is ignored and ak1=tkak2a^{k-1}=t_{k}a^{k-2} in the second part; if k2k\geq 2, we relax the coefficient ak1a^{k-1} of the second part to be tkak2t_{k}a^{k-2}. Finally consider the permutation of NN shares, the sum is the following:

(Ntk)tkak2i[K]j[|Ti|]H(Si,j)(N1tk1)ak1i[K]H(Pi).\displaystyle\binom{N}{t_{k}}t_{k}a^{k-2}\sum_{i\in[K]}\sum_{j\in[|T_{i}|]}H(S_{i,j}^{\prime})\leq\binom{N-1}{t_{k}-1}a^{k-1}\sum_{i\in[K]}H(P_{i}).

Still based on the truncation we have σ~N,𝒯|𝒯|/a\tilde{\sigma}_{N,\mathcal{T}}\geq{|\mathcal{T}|}/{a}.

B-E proof of lemma 8

Note that in a Vandermonde matrix any sub-matrix is full rank. Denote B(N,T1,T2)B(N,T_{1},T_{2}) by VV for short.

For all secrets we have rk(V𝒮[2])=|T2|(|T1|t1)+|T1|(t2|T2|)=|T1|t2t1|T2|\text{rk}(V_{\mathcal{S}_{[2]}})=|T_{2}|(|T_{1}|-t_{1})+|T_{1}|(t_{2}-|T_{2}|)=|T_{1}|t_{2}-t_{1}|T_{2}| as the identity matrix in the upper right corner of V𝒮[2]V_{\mathcal{S}_{[2]}} is full rank, so is the sub-matrix in the lower left corner since it is the sub-matrix of a Vandermonde matrix, and that the lower right corner is all-zero facilitates applying Gaussian-Elimination to obtain rank.

For any i[N]i\in[N] split the matrix corresponding to share PiP_{i} into two parts, that is, let VPilV_{P_{i}}^{l} be the first t2|T2|t_{2}-|T_{2}| columns and the last |T1|t1|T_{1}|-t_{1} columns form VPirV_{P_{i}}^{r}.

As for decodable condition, firstly note that the rank of the matrix formed by any t1t_{1} shares like VP[t1]V_{P_{[t_{1}]}} equals the number of rows of VV. The reason is that the upper t2(|T1|t1)t_{2}(|T_{1}|-t_{1}) rows of the matrix VP[t1]rV_{P_{[t_{1}]}}^{r}, which is the concatenation of the right part of every VPi,i[t1]V_{P_{i}},i\in[t_{1}] horizontally, is full rank as the number of columns is bigger than that of rows, then consider the lower t1(t2|T2|)t_{1}(t_{2}-|T_{2}|) rows of the matrix VP[t1]lV_{P_{[t_{1}]}}^{l}, it is full rank and such lower rows of VP[t1]rV_{P_{[t_{1}]}}^{r} are all-zero. In this way we have rk(VP[t1])=t2(|T1|t1)+t1(t2|T2|)=|T1|t2t1|T2|\text{rk}(V_{P_{[t_{1}]}})=t_{2}(|T_{1}|-t_{1})+t_{1}(t_{2}-|T_{2}|)=|T_{1}|t_{2}-t_{1}|T_{2}|, which is also the value of rk(V𝒮[2],P[t1])\text{rk}(V_{\mathcal{S}_{[2]},P_{[t_{1}]}}). Secondly consider the matrix formed by any t2t_{2} shares like VP[t2]V_{P_{[t_{2}]}}, of which the upper t2(|T1|t1)t_{2}(|T_{1}|-t_{1}) rows of the matrix VP[t2]rV_{P_{[t_{2}]}}^{r} are full rank and the other rows are all-zero. The upper |T2|(|T1|t1)|T_{2}|(|T_{1}|-t_{1}) rows of the matrix corresponding to the secrets 𝒮2\mathcal{S}_{2} are full rank and the other rows are all-zero. As t2>|T2|t_{2}>|T_{2}|, then every column of V𝒮2V_{\mathcal{S}_{2}} equals a linear combination of the columns from VP[t2]rV_{P_{[t_{2}]}}^{r}, we have rk(VP[t2])=rk(V𝒮2,P[t2])\text{rk}(V_{P_{[t_{2}]}})=\text{rk}(V_{\mathcal{S}_{2},P_{[t_{2}]}}).

At last consider weak secure condition. The rank of the matrix formed by any t11t_{1}-1 shares like VP[t11]V_{P_{[t_{1}-1]}} equals (t11)(t2|T2|)+t2(|T1|t1)(t_{1}-1)(t_{2}-|T_{2}|)+t_{2}(|T_{1}|-t_{1}) since both VP[t11]rV_{P_{[t_{1}-1]}}^{r} and lower t1(t2|T2|)t_{1}(t_{2}-|T_{2}|) rows of VP[t11]lV_{P_{[t_{1}-1]}}^{l} are full rank, the lower t1(t2|T2|)t_{1}(t_{2}-|T_{2}|) all-zeros rows of VP[t11]rV_{P_{[t_{1}-1]}}^{r} facilitate this observation by Gaussian-Elimination. Stack the matrix corresponding to any secret S1,j,j[|T1|]S_{1,j},j\in[|T_{1}|] and VP[t11]V_{P_{[t_{1}-1]}} horizontally, note that the former is extracted from V(|T1|t2t1|T2|,[(|T1|+N)(t2|T2|)])V(|T_{1}|t_{2}-t_{1}|T_{2}|,[(|T_{1}|+N)(t_{2}-|T_{2}|)]), similarly we have rk(VS1,j,P[t11])=rk(VS1,j)+rk(VP[t11])=|T1|t2t1|T2|\text{rk}(V_{S_{1,j},P_{[t_{1}-1]}})=\text{rk}(V_{S_{1,j}})+\text{rk}(V_{P_{[t_{1}-1]}})=|T_{1}|t_{2}-t_{1}|T_{2}|. Then we need to focus on the matrix formed by any t21t_{2}-1 shares like VP[t21]V_{P_{[t_{2}-1]}}. The rk(VS1,j,P[t21])=rk(VS1,j)+rk(VP[t21])=t2(t2|T2|)+(t21)(|T1|t1)\text{rk}(V_{S_{1,j},P_{[t_{2}-1]}})=\text{rk}(V_{S_{1,j}})+\text{rk}(V_{P_{[t_{2}-1]}})=t_{2}(t_{2}-|T_{2}|)+(t_{2}-1)(|T_{1}|-t_{1}) part follows the same procedure as for t11t_{1}-1 shares.

The case for any secret S2,j,j[|T2|]S_{2,j},j\in[|T_{2}|] is not straightforward like before. Recall the matrix VS2,jV_{S_{2,j}} corresponding to secret S2,jS_{2,j}, it has an identity matrix embedded between the (j1)(|T1|t1)+1(j-1)(|T_{1}|-t_{1})+1-th row and the j(|T1|t1)j(|T_{1}|-t_{1})-th row, the other elements of VS2,jV_{S_{2,j}} are all-zero. Stack it with VP[t21]rV_{P_{[t_{2}-1]}}^{r} horizontally, for weak secure condition we only need to consider the rank of a special matrix extracted from VP[t21]rV_{P_{[t_{2}-1]}}^{r}, i.e., the concatenation of the first (j1)(|T1|t1)(j-1)(|T_{1}|-t_{1}) rows and (t2j)(|T1|t1)(t_{2}-j)(|T_{1}|-t_{1}) rows between the j(|T1|t1)+1j(|T_{1}|-t_{1})+1-th row and the t2(|T1|t1)t_{2}(|T_{1}|-t_{1})-th row. The determinant of this matrix is related to Schur polynomials [20] which is not 0 when the order of the underlying finite field is sufficiently large. For example we can calculate the specific determinants in real number field for all cases, any of which is the product of the sum of monomials and Vandermonde determinant, thus bigger than zero, finally choose the finite field order to be larger than any determinant. In this way rk(VS2,j,P[t21])=rk(VS2,j)+rk(VP[t21])=(t21)(t2|T2|)+t2(|T1|t1)\text{rk}(V_{S_{2,j},P_{[t_{2}-1]}})=\text{rk}(V_{S_{2,j}})+\text{rk}(V_{P_{[t_{2}-1]}})=(t_{2}-1)(t_{2}-|T_{2}|)+t_{2}(|T_{1}|-t_{1}).

Appendix C proofs for (average) randomness ratio

C-A proof of lemma 9

Recall that the access structure array 𝒯\mathcal{T} has KK sub-arrays, each of them is denoted by TkT_{k} full of tkt_{k}, the same threshold value of the corresponding set of secrets 𝒮k={Sk,1,,Sk,|Tk|}\mathcal{S}_{k}=\{S_{k,1},\ldots,S_{k,|T_{k}|}\}. In this way the non-increasing property of 𝒯\mathcal{T} says that t1>>tKt_{1}>\cdots>t_{K}.

Based on corollary 1, we introduce an auxiliary access structure array 𝒯𝒯\mathcal{T}^{\prime}\supseteq\mathcal{T}. More specifically, 𝒯\mathcal{T}^{\prime} has t11t_{1}-1 sub-arrays with t1=t1,t2=t11,,tt11=2t_{1}^{\prime}=t_{1},t_{2}^{\prime}=t_{1}-1,\ldots,t_{t_{1}-1}^{\prime}=2, and the length of each is larger than or equal to the corresponding sub-array of 𝒯\mathcal{T}, i.e., for any k[t11]k\in[t_{1}-1], if there exists j[K]j\in[K] such that tk=tjt_{k}^{\prime}=t_{j}, then |Tk|=|Tj||T_{k}^{\prime}|=|T_{j}|; otherwise, |Tk|=1|T_{k}^{\prime}|=1. Then our proof is towards the structure (N,𝒯)(N,\mathcal{T}^{\prime}), and the result for the structure (N,𝒯)(N,\mathcal{T}) will be obtained from truncation.

If K2K\geq 2, for any k[2:t11]k\in[2:t_{1}-1], from the strong secure condition (3), for all A[N]A\subseteq[N] with |A|tk1|A|\leq t_{k}^{\prime}-1, we have that H(𝒮k|PA)=H(𝒮k)H(\mathcal{S}_{k}^{\prime}|P_{A})=H(\mathcal{S}_{k}^{\prime}); and from the decodable condition (2), for all B[N]B\subseteq[N] with |B|tk|B|\geq t_{k}^{\prime}, it holds that H(𝒮k|PB)=0H(\mathcal{S}_{k}^{\prime}|P_{B})=0. Substitute the single secret SS from lemma 1 by the set of secrets 𝒮k\mathcal{S}_{k}^{\prime}, for any index i[t1k+1]i\in[t_{1}-k+1] where we use the relation that tk=t1k+1t_{k}^{\prime}=t_{1}-k+1 due to the continuous nature, t1k+1t_{1}-k+1 inequalities are prepared in the following:

H(𝒮k)\displaystyle H(\mathcal{S}_{k}^{\prime}) I(P1;Pt1k+2|P[t1k+1]/{1}),\displaystyle\leq I(P_{1};P_{t_{1}-k+2}|P_{[t_{1}-k+1]/\{1\}}),
H(𝒮k)\displaystyle H(\mathcal{S}_{k}^{\prime}) I(P2;Pt1k+2|P[t1k+1]/{2}),\displaystyle\leq I(P_{2};P_{t_{1}-k+2}|P_{[t_{1}-k+1]/\{2\}}),
\displaystyle\cdots
H(𝒮k)\displaystyle H(\mathcal{S}_{k}^{\prime}) I(Pt1k+1;Pt1k+2|P[t1k+1]/{t1k+1}).\displaystyle\leq I(P_{t_{1}-k+1};P_{t_{1}-k+2}|P_{[t_{1}-k+1]/\{t_{1}-k+1\}}).

For the boundary case k=1k=1, we introduce t1t_{1} conditional entropy bounds instead of conditional mutual information ones like in the proof of lemma 2.

H(𝒮1)\displaystyle H(\mathcal{S}_{1}^{\prime}) H(P1|P[t1]/{1}),\displaystyle\leq H(P_{1}|P_{[t_{1}]/\{1\}}),
H(𝒮1)\displaystyle H(\mathcal{S}_{1}^{\prime}) H(P2|P[t1]/{2}),\displaystyle\leq H(P_{2}|P_{[t_{1}]/\{2\}}),
\displaystyle\cdots
H(𝒮1)\displaystyle H(\mathcal{S}_{1}^{\prime}) H(Pt1|P[t1]/{t1}).\displaystyle\leq H(P_{t_{1}}|P_{[t_{1}]/\{t_{1}\}}).

Then the sum of these (t11)(t1+2)/2(t_{1}-1)(t_{1}+2)/2 inequalities leads to the following bound

k[K]tkH(𝒮k)H(P[t1])I(P1;P2)H(P[N]).\sum_{k\in[K]}t_{k}^{\prime}H(\mathcal{S}_{k}^{\prime})\leq H(P_{[t_{1}]})-I(P_{1};P_{2})\leq H(P_{[N]}). (39)

If K=1K=1, similarly consider the above t1t_{1} conditional entropy bounds and the second part in the proof of threshold-sum-difference-bound (17). The sum leads to

t1H(𝒮1)H(P[t1])k[t11]I(Pk;P[k+1:t1]|P[k1])H(P[N]).t_{1}H(\mathcal{S}_{1}^{\prime})\leq H(P_{[t_{1}]})-\sum_{k\in[t_{1}-1]}I(P_{k};P_{[k+1:t_{1}]}|P_{[k-1]})\leq H(P_{[N]}). (40)

C-B proof of lemma 11

Still we use plain number instead of index like j1j_{1} as in the proof of lemma 1 for simplicity, and an auxiliary access structure array 𝒯𝒯\mathcal{T}^{\prime}\supseteq\mathcal{T} is introduced like the proof in lemma 2. More specifically, the access structure array 𝒯\mathcal{T}^{\prime} consists of t11t_{1}-1 continuous natural numbers from t1t_{1} to 22, we replace the starting index 11 by k+tkt1k+t_{k}-t_{1}, i.e., tk+tkt1=t1,,tk+tk2=2t_{k+t_{k}-t_{1}}^{\prime}=t_{1},\ldots,t_{k+t_{k}-2}^{\prime}=2, in this way we have tk=tkt_{k}^{\prime}=t_{k} from the relation ti=k+tkit_{i}^{\prime}=k+t_{k}-i.

When k=1k=1 we use i[k+tkt1:k+tk2]j|Ti|H(Si,j)H(P[N])\sum_{i\in[k+t_{k}-t_{1}:k+t_{k}-2]}\sum_{j\in|T_{i}^{\prime}|}H(S_{i,j}^{\prime})\leq H(P_{[N]}) by decodable condition directly. Otherwise fix an index k[2:K]k\in[2:K], two parts of inequalities will be presented.

The first part considers the secrets 𝒮[k:k+tk2]\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}. Based on the non-negativeness of conditional mutual information, we list tkt_{k} inequalities in the following:

I(P1;P2,,Ptk+1|𝒮[k:k+tk2])\displaystyle I(P_{1};P_{2},\ldots,P_{t_{k}+1}|\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0,\displaystyle\geq 0,
I(P2;P3,,Ptk+1|P1,𝒮[k:k+tk2])\displaystyle I(P_{2};P_{3},\ldots,P_{t_{k}+1}|P_{1},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0,\displaystyle\geq 0,
\displaystyle\cdots
I(Ptk;Ptk+1|P1,,Ptk1𝒮[k:k+tk2])\displaystyle I(P_{t_{k}};P_{t_{k}+1}|P_{1},\ldots,P_{t_{k}-1}\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) 0.\displaystyle\geq 0.

Consider the sum of these tkt_{k} inequalities and recall the decodable condition (2), substitute H(P1,Ptk,𝒮[k:k+tk2])H(P_{1},\ldots P_{t_{k}},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) by H(P1,Ptk)H(P_{1},\ldots P_{t_{k}}), for any i[tk]i\in[t_{k}] replace the conditional entropy H(Pi|P[tk+1]/{i},𝒮[k:k+tk2])H(P_{i}|P_{[t_{k}+1]/\{i\}},\mathcal{S}_{[k:k+t_{k}-2]}^{\prime}) by H(Pi|P[tk+1]/{i})H(P_{i}|P_{[t_{k}+1]/\{i\}}), and via the independent assumption of secrets (1) we finally have

i[k:k+tk2]j|Ti|H(Si,j)H(P[tk])i[tk]H(Pi|P[tk+1]/{i}).\sum_{i\in[k:k+t_{k}-2]}\sum_{j\in|T_{i}^{\prime}|}H(S_{i,j}^{\prime})\leq H(P_{[t_{k}]})-\sum_{i\in[t_{k}]}H(P_{i}|P_{[t_{k}+1]/\{i\}}). (41)

The second part considers the rest secrets, i.e., 𝒮[k+tkt1:k1]\mathcal{S}_{[k+t_{k}-t_{1}:k-1]}^{\prime}. Still based on the bound of lemma 1, for any index i[k+tkt1+1:k1]i\in[k+t_{k}-t_{1}+1:k-1], ti=k+tkit_{i}^{\prime}=k+t_{k}-i inequalities are prepared in the following:

H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P1;Pk+tki+1|P[k+tki]/{1}),\displaystyle\leq I(P_{1};P_{k+t_{k}-i+1}|P_{[k+t_{k}-i]/\{1\}}),
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(P2;Pk+tki+1|P[k+tki]/{2}),\displaystyle\leq I(P_{2};P_{k+t_{k}-i+1}|P_{[k+t_{k}-i]/\{2\}}),
\displaystyle\cdots
H(Si,1)\displaystyle H(S_{i,1}^{\prime}) I(Pk+tki;Pk+tki+1|P[k+tki]/{k+tki}).\displaystyle\leq I(P_{k+t_{k}-i};P_{k+t_{k}-i+1}|P_{[k+t_{k}-i]/\{k+t_{k}-i\}}).

For the boundary case i=k+tkt1i=k+t_{k}-t_{1}, we introduce t1t_{1} conditional entropy bounds instead of conditional mutual information ones like in the proof of lemma 1.

H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(P1|P[t1]/{1}),\displaystyle\leq H(P_{1}|P_{[t_{1}]/\{1\}}),
H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(P2|P[t1]/{2}),\displaystyle\leq H(P_{2}|P_{[t_{1}]/\{2\}}),
\displaystyle\cdots
H(Sk+tkt1,1)\displaystyle H(S_{k+t_{k}-t_{1},1}^{\prime}) H(Pt1|P[t1]/{t1}).\displaystyle\leq H(P_{t_{1}}|P_{[t_{1}]/\{t_{1}\}}).

Then the sum of these (t1tk)(t1+tk+1)/2(t_{1}-t_{k})(t_{1}+t_{k}+1)/2 inequalities leads to the following bound

i=k+tkt1k1(k+tki)H(Si,1)H(P[tk])+i[tk]H(Pi|P[tk+1]/{i})+H(P[t1]).\sum_{i=k+t_{k}-t_{1}}^{k-1}(k+t_{k}-i)H(S_{i,1}^{\prime})\leq-H(P_{[t_{k}]})+\sum_{i\in[t_{k}]}H(P_{i}|P_{[t_{k}+1]/\{i\}})+H(P_{[t_{1}]}). (42)

From the permutation of the indices of shares as mentioned in the proof of lemma 1 and the truncation technique from corollary 1, the final result follows by the sum of these two parts.

C-C proof of lemma 12

Note that in a Vandermonde matrix any sub-matrix is full rank. Denote A(N,T1,a)A(N,T_{1},a) by VV for short.

For all secrets we have rk(V𝒮1)=a|T1|\text{rk}(V_{\mathcal{S}_{1}})=a|T_{1}| since it is the sub-matrix of a Vandermonde matrix.

For any t1t_{1} shares, we have at1at_{1} different columns extracted from V(a|T1|,[a(|T1|+N)])V(a|T_{1}|,[a(|T_{1}|+N)]) and at least a(|T1|t1)a(|T_{1}|-t_{1}) different columns from V(a(|T1|t1),[(Nt1+a)(|T1|t1)])V(a(|T_{1}|-t_{1}),[(N-t_{1}+a)(|T_{1}|-t_{1})]) stacked with an all-zero matrix. From this view stack these two matrices horizontally, we can see that the upper right corner is full rank, so is the sub-matrix in the lower left corner since both are the sub-matrices of Vandermonde matrices, and that the lower right corner is all-zero facilitates applying Gaussian-Elimination to obtain the decodable condition, i.e., rk(VPd)=rk(V𝒮1,Pd)=a|T1|\text{rk}(V_{P_{d}})=\text{rk}(V_{\mathcal{S}_{1},P_{d}})=a|T_{1}| where PdP_{d} denotes any t1t_{1} shares.

For any t11t_{1}-1 shares, we have a(t11)a(t_{1}-1) different columns extracted from V(a|T1|,[a(|T1|+N)])V(a|T_{1}|,[a(|T_{1}|+N)]), regardless of the number of participants NN we assume there are at most (t11)(|T1|t1)(t_{1}-1)(|T_{1}|-t_{1}) different columns from V(a(|T1|t1),[(|T1|t1)max(Nt1+a,t11)])V(a(|T_{1}|-t_{1}),[(|T_{1}|-t_{1})\cdot\max(N-t_{1}+a,t_{1}-1)]) stacked with an all-zero matrix. From this view stack these two matrices horizontally and denote any t11t_{1}-1 shares by PsP_{s} we can see that rk(VPs)=a(t11)+a(|T1|t1)=a(|T1|1)\text{rk}(V_{P_{s}})=a(t_{1}-1)+a(|T_{1}|-t_{1})=a(|T_{1}|-1) as at11a\leq t_{1}-1 and following the similar procedure in decodable condition above. Then consider any secret, we have aa different columns extracted from V(a|T1|,[a(|T1|+N)])V(a|T_{1}|,[a(|T_{1}|+N)]), stack these two matrices horizontally and the final matrix is still full rank. Finally we have rk(VS1,j,Ps)=rk(VS1,j)+rk(VPs)=a|T1|,j[|T1|]\text{rk}(V_{S_{1,j},P_{s}})=\text{rk}(V_{S_{1,j}})+\text{rk}(V_{P_{s}})=a|T_{1}|,j\in[|T_{1}|].

When a=1a=1 we find that any |T1|t1|T_{1}|-t_{1} columns from V(a(|T1|t1),[(Nt1+a)(|T1|t1)])V(a(|T_{1}|-t_{1}),[(N-t_{1}+a)(|T_{1}|-t_{1})]) form an square matrix which is full rank. Then this part can be substituted by an identity matrix and the order of the underlying finite field may be smaller.

References

  • [1] Adi Shamir. How to share a secret. Communications of The ACM, 22(11):612–613, 1979.
  • [2] D. R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography, 2(4):357–390, 1992.
  • [3] Wen-Ai Jackson and Keith M. Martin. Perfect secret sharing schemes on five participants. Designs, Codes and Cryptography, 9(3):267–286, 1996.
  • [4] Oriol Farràs, Tarik Kaced, Sebastià Martín, and Carles Padro. Improving the linear programming technique in the search for lower bounds in secret sharing. IEEE Transactions on Information Theory, 66(11):7088–7100, 2020.
  • [5] Carles Padró. Lecture notes in secret sharing. IACR Cryptology ePrint Archive, 2012:674, 2012.
  • [6] Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro. Randomness in distribution protocols. Information and Computation, 131(2):111–139, 1996.
  • [7] Oriol Farràs, Ignacio Gracia, Sebastià Martín, and Carles Padró. Linear threshold multisecret sharing schemes. Information Processing Letters, 112(17-18):667–673, 2012.
  • [8] Chun-ming Tang and Shu-guang Dai. The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures. Acta Mathematicae Applicatae Sinica, English Series, 30(4):1073–1084, 2014.
  • [9] Gustavus J Simmons. An introduction to shared secret and/or shared control schemes and their application. 1992.
  • [10] Ali Khalesi, Mahtab Mirmohseni, and Mohammad Ali Maddah-Ali. The capacity region of distributed multi-user secret sharing. IEEE Journal on Selected Areas in Information Theory, 2(3):1057–1071, 2021.
  • [11] Mahdi Soleymani and Hessam Mahdavifar. Distributed multi-user secret sharing. IEEE Transactions on Information Theory, 67(1):164–178, 2020.
  • [12] Alfredo De Santis and Barbara Masucci. Multiple ramp schemes. IEEE Transactions on Information Theory, 45(5):1720–1728, 1999.
  • [13] Javier Herranz, Alexandre Ruiz, and Germán Sáez. New results and applications for multi-secret sharing schemes. Designs, codes and cryptography, 73(3):841–864, 2014.
  • [14] Robert J. McEliece and Dilip V. Sarwate. On sharing secrets and reed-solomon codes. Communications of the ACM, 24(9):583–584, 1981.
  • [15] Ehud Karnin, Jonathan Greene, and Martin Hellman. On secret sharing systems. IEEE Transactions on Information Theory, 29(1):35–41, 1983.
  • [16] László Csirmaz. How to share secrets simultaneously. Cryptology ePrint Archive, 2011.
  • [17] Zhen Zhang and R.W. Yeung. On characterization of entropy function via information inequalities. IEEE Transactions on Information Theory, 44(4):1440–1452, 1998.
  • [18] Bohdan L Kaluzny. Polyhedral computation: a survey of projection methods. 2002.
  • [19] Bob Pakzad-Hurson, Greg Ference, Veselka Kafedzhieva, Michael Cline, Akinwale Akinbiyi, Ethan Wright, Richard Benjamin, and Douglas Mercer. Linear programming: Penn state math 484 lecture notes. 2014.
  • [20] Amritanshu Prasad. An introduction to schur polynomials. arXiv preprint arXiv:1802.06073, 2018.