Multiple Threshold Schemes Under The Weak Secure Condition
Abstract
In this paper, we consider the case that sharing many secrets among a set of participants using the threshold schemes. All secrets are assumed to be statistically independent and the weak secure condition is focused on. Under such circumstances we investigate the infimum of the (average) information ratio and the (average) randomness ratio for any structure pair which consists of the number of the participants and the threshold values of all secrets.
For two structure pairs such that the two numbers of the participants are the same and the two arrays of threshold values have the subset relationship, two leading corollaries are proved following two directions. More specifically, the bound related to the lengths of shares, secrets and randomness for the complex structure pair can be truncated for the simple one; and the linear schemes for the simple structure pair can be combined independently to be a multiple threshold scheme for the complex one. The former corollary is useful for the converse part and the latter one is helpful for the achievability part.
Three new bounds special for the case that the number of secrets corresponding to the same threshold value is lager than and two novel linear schemes modified from the Vandermonde matrix for two similar cases are presented. Then come the optimal results for the average information ratio, the average randomness ratio and the randomness ratio. We introduce a tiny example to show that there exists another type of bound that may be crucial for the information ratio, to which we only give optimal results in three cases.
Index Terms:
multi-secret sharing, threshold access structure, the weak secure condition, the Shannon-type inequality, polyhedral cone, projection, generator matrix, linear scheme, Vandermonde matrix, Gaussian EliminationI introduction
A secret sharing scheme is a method to share a secret among a set of participants such that only certain subsets of participants can recover the secret while any other subset obtains nothing[1].
Establishing bounds on the length of the shares to be given to participants in secret sharing schemes is one of the fundamental problems. If the length of the shares given to participants are too long compared to the length of the secret, the whole scheme may be inefficient. Researchers are interested in the (average) ratio between the length of the shares and the secret, the number of different structures is finite for fixed participant size and it turns out that linear schemes can achieve the best ratios when the number of participants [2]. If , [3] had already handled most structures. Until recently the work is moved further by introducing the converse for linear schemes and constructing the corresponding generator matrices [4]. While the general results in converse or achievability are far from tight as discussed in [5].
The problem of estimating the amount of random bits necessary to set up the schemes has also received attention recently. As the amount of randomness needed by an algorithm is to be treated as a computational resource, analogously to the amount of time and space needed. [6] initiated a quantitative investigation of the number of random bits needed by secrets sharing schemes and found optimal results for some schemes. Some other results relate to this criteria can be found in [7, 8].
There are some situations where more than one secret is to be shared among participants. [9] introduced the missile battery scenario where not all of the missiles have the same launch enable code. Linear threshold multisecret sharing schemes are studied in [7] where the distributed secrets are in one-to-one correspondence with the sets of -out-of- participants, i.e., the number of secrets equals and the decoding condition relies on such set of length . Distributed multi-user secret sharing scheme is also emerged where secret sharing schemes are implied in the distributed storage systems [10, 11].
From one secret to multiple secrets among the same participants, the decodable condition for the latter can be seen as considering multiple secrets individually. While the secure condition varies depending on two criteria: the strong version and the weak version. For example, the strong secure condition asks that any set of participants which is unable to decode secret or secret has no information on the whole set of these two secrets, however, the weak secure condition says that such set of participants has no information on any single one secret, which means some information about secrets and like linear combinations may be known.
In [12], the authors show that under the strong secure condition, when the secrets are statistically independent, the best we can do is combining individual ramp schemes independently. [13] has showed that under the weak secure condition, we may gain more efficiency at the cost of security.
In this paper, we focus on the special model implied by [12]. More specifically, we involve threshold scheme such that any set of participant either decodes the secret or learns nothing, while ramp scheme is more general and has gaps. We follow the assumption that all secrets are statistically independent in order to obtain theoretical results that shining the fundamental limits like in [12]. The weak secure condition is focused on, as we care about multiple threshold scheme of any structure, in particular the case that the number of secrets corresponding to the same threshold value is lager than , the existing different-threshold-bound in [13] is not enough. Like the (average) ratio and the randomness criteria discussed for single secret sharing scheme, we pursue the infimum of the (average) information ratio and the (average) randomness ratio of any possible structure for multiple threshold scheme and hope that such four ratios will give a basic understanding of this problem.
In this paper, every possible structure is of concern for us. For fixed number of participants, when two access structure arrays have the subset relationship, in the converse part we find that the region formed by the Shannon-type inequalities and system conditions of the simple structure is completely embedded in the region of the complex one; in the achievability part linear schemes of the simple structure can be combined independently to be a multiple threshold scheme for the complex structure. Thus the bridge between different structures is built and guaranteed theoretically.
The case that the number of secrets corresponding to the same threshold value is lager than is special and inspires three new bounds in addition to the different-threshold-bound in [13], which are threshold-sum-difference-bound, threshold-product-bound and threshold-sum-bound. Existing linear scheme when under the weak secure condition is based on the Vandermonde matrix as in [14, 15, 13, 16]. Still in this case we propose two novel linear schemes which are modified from the Vandermonde matrix like in [10] to meet the bounds. And we can learn that as the weak secure condition asks the protection of any single one secret, the assumption that the secrets are statistically independent may promote this requirement.
Finally relate these new findings and existing results to the four ratios, we claim optimality in the average information ratio, the average randomness ratio and the randomness ratio. Still new patterns of bounds need to be investigated further as we only get optimal results for the information ratio in three cases.
II problem formulation
II-A system model
A threshold scheme is a protocol to distribute a secret among a set of participants in such a way that any set of participants of cardinality greater than or equal to can decode the secret and any set of participants of cardinality less than or equal to has no information on , we refer these two conditions as the decodable condition and the secure condition.
Such protocol is treated as a special discrete probability distribution with random variables [2]: the secret and the -th share of the -th participant for every in the set . In this way suppose a dealer wants to share the secret among the participants, he does this by giving the -th participant the share for every according to the conditional probability , where are chosen from a finite field. The specificity of this discrete probability distribution corresponds to the two requirements of the protocol. More specifically, given any set of shares of cardinality greater than or equal to , the conditional probability of the secret is equal to 1 or 0, i.e., the conditional entropy of the secret given or more shares equals 0; given any set of shares of cardinality less than or equal to , the conditional probability of the secret is equal to , i.e., the conditional entropy of the secret given or less shares equals the entropy of the secret , in other words, the secret and or less shares are statistically independent.
In this paper we consider the case in which we want to share many secrets among a set of participants, using the threshold schemes. As every single one secret has its corresponding threshold value determining the decodable and secure conditions, we naturally arrange the threshold values of all secrets in non-increasing order without loss of generality in an array , named as the access structure array.
From one secret to multiple secrets among the same participants, the decodable condition for the latter can be seen as considering multiple secrets individually, e.g., any set of participants of cardinality greater than or equal to the first element of the access structure array can decode all secrets due to the non-increasing order. While the secure condition varies depending on two criteria: the strong version and the weak version. For example, the strong secure condition asks that any set of participants of cardinality strictly less than the last element of the access structure array has no information on the whole set of secrets, however, the weak secure condition says that such set of participants has no information on any single one secret, which means some information about all secrets like linear combinations may be known. Still use the technique of discrete probability distribution, we define a multiple threshold scheme as follows.
Definition 1 (Multiple Threshold Scheme)
The structure of a multiple threshold scheme is denoted by the pair , where is the number of participants, is the number of unique elements in the access structure array since there may be some secrets with the same threshold value, and for any , is also an array with length full of , the same threshold value of the corresponding set of secrets . An multiple threshold scheme is a discrete probability distribution with random variables of which the secrets are assumed to be statistically independent, i.e.,
(1) |
Like threshold scheme, the decodable and secure conditions are made in the following. For any ,
-
1.
The decodable condition: Any set of at least participants can decode the set of secrets. Formally, for all with , let , it holds that
(2) -
2.
The strong secure condition: Any set of at most participants has no information on the set of secrets. Formally, for all with , it holds that
(3) -
3.
The weak secure condition: Any set of at most participants has no information on any single one secret , where and . Formally, for all with , it holds that
(4)
Remark 1
Note that these two secure conditions are different and each will be investigated when combined with the same decodable condition and the assumption that all secrets are statistically independent. When the length of the access structure array equals , the assumption of secrets is meaningless, both strong and weak secure condition are the same, that is, the system conditions of multiple threshold scheme degrade to those of threshold scheme.
The efficiency of a threshold scheme is usually measured by the ratio between the length of a share and the secret. Form a set of entropy of every single share, the information ration is defined as the maximum value of this set divided by the entropy of the secret and the average information ratio is defined similarly except that the numerator is replaced by the average value of the same set. As for an multiple threshold scheme, the information ration and the average information ration are defined similarly as follows:
(5) | |||
(6) |
Note that the major difference for a multiple threshold scheme is that the denominator of the information ratio is replaced by the minimum of the length of every secret as in [7] and the average information ratio considers the average length of all secrets to divide.
For fixed participants, since a multiple threshold scheme has more random variables than a threshold scheme, the former is more complicated. Then comes the notion of randomness, a fundamental computation resource because truly random bits are hard to obtain. The total randomness present in an multiple threshold scheme is the entropy of the whole shares, i.e., , which takes into account also the randomness of all secrets as shares can decode all secrets. In this paper we mainly consider the randomness for the dealer to set up a multiple threshold scheme for secrets , that is, the randomness he uses to generate the shares given the marginal discrete probability distribution of secrets . Therefore, we define the randomness ratio as the difference between the length of shares and that of secrets, then divided by the minimum of the set formed by the length of every secret. The definition for the average randomness ratio is similar except that the denominator is replaced by the average value of such set. More specifically,
(7) | |||
(8) |
As all secrets are statistically independent by the assumption, the randomness of all secrets can be replaced by the sum of entropy of every single secret as in equation (1).
The problem that we investigate in this paper is to optimize the (average) information ratio and the (average) randomness ratio of multiple threshold schemes. Given the number of participants and the access structure array , we define as the infimum of the (average) information ration of all multiple threshold schemes, moreover, and are defined similarly. For all possible choices of the structure , we are interested in determining the above four values via their lower bounds and upper bounds.
II-B lower bound
Note that for any probability distribution with discrete random variables, we can extract its entropies and arrange them into a vector . Any such vector satisfies the so-called Shannon-type inequalities [17]. More specifically, let be a -dimension Euclidean space whose coordinates are labeled by , , where is the set of random variables and we use another notation for the secrets. Then let be a polyhedral cone represented by the intersection of two categories of closed half-spaces, which are derived from the Shannon-type inequalities:
-
1.
Non-decreasing: If , then ,
-
2.
Submodular: ,
where is taken to be 0. Note that for every discrete probability distribution and the corresponding vector , we have (conditional) entropy and (conditional) mutual information greater than and equal to 0, which correspond to being non-decreasing and submodular respectively, then .
As the independent assumption for secrets (1), the decodable condition (2), the strong secure condition (3) and the weak secure condition (4) can all be handled as homogeneous linear equations involving the coordinates from only, for fixed structure of any multiple threshold scheme, we add four intersections of hyperplane(s) as follows. Let , for every and ,
(9) | ||||
(10) | ||||
(11) | ||||
(12) |
In this way, consider a vector whose components are the entropies obtained from an multiple threshold scheme under weak secure condition (4), we have , here we denote by for ease of notation. And when replace weak secure condition by strong one, it follows that the corresponding vector belongs to .
For a fixed structure , recall the definitions of the four ratios above, besides their connections with any discrete probability distributions meeting some system conditions, there are also some quantities of interest, i.e., the set of entropies of every share and secret for the (average) information ratio and the set of entropies of shares and every secret for the (average) randomness ratio. As for the polyhedral cone under (strong) weak secure condition, of which we care about the sets of the corresponding coordinates likewise, i.e., for the (average) information ratio and for the (average) randomness ratio. In this way, the region involving these coordinates is enough to derive the lower bounds for the four ratios. To gain a more exact characterization, a suitable concept is illustrated as follows: A projection [18] of a region in onto its subspace of the first coordinates is
(13) |
Then and are essential for the (average) information ratio and (average) randomness ratio respectively.
Recall that every possible structure is of concern for us. For fixed number of participants, two different access structure arrays and may have a relationship similar to the subset concept from set theory, thus we give the following definition with some abuse of notation:
Definition 2 (Subset of Arrays)
if and only if for every , there exists such that and , where is the same threshold value of the sub-array .
When and for the same number of participants, in the polyhedral cone formed by the Shannon-type inequalities, there exist some interesting geometrical properties between two regions and , where is the intersection of hyperplanes defined from the structure . For the ease of notation we reuse coordinates of from and rearrange the elements of these two access structure arrays such that for every , the two corresponding secrets from and respectively have the same threshold value, here the non-increasing order of both access structure arrays may be broken due to such forcible arrangement. Denote all coordinates of the former region by and we give the following theorem:
Theorem 1
When the number of participants is fixed and two access structure arrays have the subset relationship, i.e., , the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure is exactly equal to the projection of the corresponding polyhedral cone of the structure , i.e., .
Proof:
The proof is conducted in two directions, i.e., any point of the former is in the later, and vice versa. The detail is put in Appendix A-A. ∎
Remark 2
This theorem offers a theoretical guarantee that some important bounds of the bigger region, after a projection algorithm like Fourier-Motzkin-Elimination, are still feasible and even fundamental for the smaller region. A direct example is the following corollary.
Corollary 1
When the number of participants is fixed and two access structure arrays have the subset relationship, i.e., , a feasible bound for the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure can be truncated to be a feasible bound of the corresponding polyhedral cone of the structure . More specifically, for any vector , if there exists a feasible bound such that , where every coefficient is non-negative, then for any vector , .
Proof:
For any , consider a submodular inequality and a non-decreasing one , plus these two together, we get . Then is also a feasible bound. Based on the equation result of theorem 1, such bound is also feasible for the vectors of the region . ∎
Remark 3
For an access structure array with continuous unique threshold values, the proofs of some bounds may be more read-friendly. And by this corollary, the bound for a non-continuous access structure array can be obtained by the truncation from the bound of a continuous access structure array , and it turns out that some bounds obtained in this way are enough for the four ratios.
II-C linear scheme
Before introducing the so-called linear scheme [15], some concepts need to be illustrated. Let be a vector space with finite dimension over a finite field , where is a prime number. Recall that is the set of random variables essential to an multiple threshold scheme. For every , denote a subset of by , we assume that all vectors of are linear independent, then the length of such subset is , here calculates the rank of its input. Hereafter, we treat each as a matrix of shape and stack such matrices in sequence horizontally (column wise) into a bigger matrix , referred as a generator matrix.
Then consider a uniform discrete probability distribution whose alphabet is the set of different row vectors with length taking values from . These vectors can be stacked vertically into a matrix . For , with the set of row vectors as the alphabet and that the probability of each equals , it forms a new discrete probability distribution with random variables from the set , where , with the base of the logarithm being and denotes a matrix stacked horizontally by the corresponding matrices. Note that if , then some row vectors of are the same and the corresponding probabilities need to be summed; otherwise, all are unique.
Recall that is the number of unique elements in the access structure array and for any , is also an array with length full of , the same threshold value of the corresponding set of secrets . Based on the relationship between discrete probability distribution and generator matrix, consider the latter as a linear scheme, then we give the following definition of linear multiple threshold scheme:
Definition 3 (Linear Multiple Threshold Scheme)
A linear multiple threshold scheme is a special generator matrix satisfying the following system conditions:
-
1.
All secrets are statistically independent: .
-
2.
The decodable condition: For every and all with , .
-
3.
The strong secure condition: For every and all with , .
-
4.
The weak secure condition: For every and all with , , where and .
Note that these four conditions are rewritten from (1), (2), (3) and (4) in section II-A, still only one of the two secure conditions is chosen for a corresponding model and for simplicity we do not mention which secure condition is implied in this subsection.
Remark 4
From the view of a linear multiple threshold scheme, both the generation of shares and the decoding of secrets can be treated as linear mappings, which are more neat than the general ones. As every codeword corresponds to secret values and a distribution of shares, furthermore, the whole probability distribution is uniform, then the length of every share is exactly the number of symbols given to the corresponding participant from the dealer. The decodable condition tells that every vector in can be written as a linear combination of vectors in , which means that any or more shares determine the secrets linearly. As for the (strong) weak secure condition, all elements of the union of and are linear independent, which implies that the random variables and constructed are statistically independent. The independent assumption for all secrets follows similarly.
In this paper we only use linear multiple threshold schemes for achievability. Then the entropy part from all four ratios can be replaced by the the rank part. For a fixed structure , if we can construct a corresponding linear multiple threshold scheme, i.e., a generator matrix satisfying the system conditions, we have upper bounds of the four ratios. When upper bound and lower bound match, the optimum can be claimed.
As we care about every possible structure , recall that for fixed number of participants , two different access structure arrays and may have a subset relationship similar to two sets according to definition 2. Still for the ease of notation, we rearrange the elements of these two access structure arrays such that for every , the two corresponding secrets from and respectively have the same threshold value, finally we claim that
Theorem 2
When the number of participants is fixed and two access structure arrays have the subset relationship, i.e., , any generator matrix for the structure is also a linear multiple threshold scheme which reuses the random variable of the former and .
Proof:
The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix A-B. ∎
Remark 5
The construction of a linear multiple threshold scheme may be easier when there are not too many secrets to share, i.e., the length of the access structure array is small. In this way, this theorem offers a degradation method to construct a more complicated scheme. As will be discussed below, it turns out to be a building block from simple schemes to a complex one.
Different generator matrices can be combined independently, i.e., in the diagonal, to form a bigger generator matrix of which every rank term equals the sum of those from the original generator matrices. The detail is in the following:
Definition 4 (Independent Combination of Generator Matrices)
For the same set of random variables , assume over the same finite field there are existing generator matrices, each is denoted by and the corresponding shape is . The independent combination of these generator matrices is a bigger generator matrix , where for any the sub-matrix is a diagonal arrangement of the corresponding sub-matrices from the original generator matrices. More specifically, let the shape of the sub-matrix be and fill with zeroes, then for every in turn put in the diagonal of .
Note that the we can do Gaussian-Elimination towards the rows of a generator matrix and the corresponding rank terms do not change, in this way we fix the number of rows of a generator matrix to be the rank of the whole matrix. When there exist an all-zero , we do nothing for the sub-matrix of the final bigger generator matrix when it is the turn of the sub-matrix from original generator matrices in the diagonal arrangement.
Remark 6
By the diagonal arrangement and based on the same finite field, it follows that for any non-empty set
(14) |
The rigorous proof can follow the direct implementation of Gaussian-Elimination horizontally (column wise) and is omitted here.
Via the claim that a simple linear multiple threshold scheme can be treated as a complex one with somewhat of degradation in theorem 2, and using the construction method that independently combing existing linear multiple threshold schemes as in definition 4, we give the following corollary.
Corollary 2
When the number of participants is fixed and access structure arrays have the subset relationship, i.e., . Assume over the same finite field there are existing generator matrices, each is denoted by and for the structure . Then the independent combination of these generator matrices is a linear multiple threshold scheme.
Proof:
From theorem 2, for any , a linear scheme for the structure is also a linear multiple threshold scheme when . Recall the system conditions of a linear multiple threshold scheme in definition 3, each of them is some equations involving the rank terms only. As the independent combination results in the sum of rank terms as in (14), the conclusion follows. ∎
Remark 7
From one secret to multiple ones, a trivial idea to accomplish the construction of an multiple threshold scheme is combining threshold schemes independently. As for liner schemes, this corollary applies the notion of independence and builds a bridge from some simple schemes to a complex one. It turns out that some linear schemes obtained in this way are enough for the four ratios.
III (Average) information ratio
We firstly discuss multiple threshold schemes with the strong secure condition, of which some results can be modified for the weak one.
III-A strong secure
III-A1 converse
We firstly discuss some converse results that are fundamental for lower bounds of the (average) information ratio.
Lemma 1 (Size of A Secret)
For any threshold scheme, if , then
where are different values chosen from the set .
Proof:
To improve readability, we replace the index by , the final result can be transformed back later. Hereafter, we use this trick in the following whole paper.
Note that the first equation is nothing but the decodable and secure conditions of a threshold scheme, the other equations are from the definitions of (conditional) entropy and (conditional) mutual information, and the last inequality uses the submodular property. ∎
Remark 8
Existing result shows that the length of a share must be bigger than or equal to the length of a secret [5], for example, if , . While this lemma tells that the length of a secret is not larger than the mutual information between any two shares given any other shares. In this sense, this bound is tighter and will be a building block for other interesting bounds of this paper.
From one secret to multiple ones, when under the strong secure condition, the following bound is enough for the investigation of the (average) information ratio and even the heterogeneous-secret-size problem as in [12].
Lemma 2
For any multiple threshold scheme with the strong secure condition, it holds that , .
Proof:
Remark 9
This bound says that when under the strong secure condition, the sum of the length of every secret is no bigger than the length of any single share. This is implied by the work from [12], while our proof may be more read-friendly due to the building block in lemma 1. Then consider the (average) information ratio, for any multiple threshold scheme, we apply this bound and it turns out that and , i.e., lower bounds are formed.
III-A2 achievability
Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio.
Still we want to link the known results of a single secret to multiple ones. For a linear threshold scheme, its generator matrix is closely related to the Vandermonde matrix over a finite field. More specifically, let fully denote the following matrix from , where is a prime number larger than . In this notation, and means the number of rows of the matrix and the elements of the second row in increasing order respectively.
Definition 5 (The Transpose of A Vandermonde Matrix)
(15) |
here we let the first column be the sub-matrix , the second column correspond to the first share and so on. Due to the determinant of a Vandermonde matrix, any columns corresponding to any shares are full rank, so are any columns corresponding to any shares combined with the first column corresponding to the secret , then is a linear threshold scheme.
Recall that from one secret to multiple ones, we can imply the independent combination of linear threshold schemes to get a linear multiple threshold scheme according to corollary 2. More specifically, given any structure , we prepare a linear threshold scheme based on for any , each of them is also a degradation version of linear multiple threshold scheme with the strong secure condition. The independent combination of these generator matrices leads to a linear multiple threshold scheme with the strong secure condition such that and . And the order of the underlying finite field is still larger than . Then we have and . Finally the optimum can be claimed.
Theorem 3
The infimum of the (average) information ratio equals the number of the secrets, i.e., , when under the strong secure condition.
Proof:
The proof follows from the above illustrations. ∎
Remark 10
The novelty of this theorem compared to the known results of [12] is embedding the two criteria, i.e., the average information ratio and information ratio. Both criteria show that the more secrets, the less efficiency.
III-B weak secure
III-B1 converse
We firstly discuss some converse results that are fundamental for lower bounds of the (average) information ratio when under the weak secure condition.
Lemma 3 (Different-Threshold-Bound)
For any multiple threshold scheme with the weak secure condition, for any share index and secret index of the sub-array , it holds that
(16) |
Proof:
Remark 11
Recall that the access structure array can be divided into different sub-arrays based on unique threshold values. In this way different-threshold-bound says that the sum of the length of different kinds of secrets is no bigger than the length of any secret, which is a weak version of lemma 2 due to the weak secure condition. This bound is already known as a special case of the result from [13]. We find that it is crucial for the (average) information ratio. More specifically, for any structure , the infimum of the information ratio .
As mentioned before, we care about every possible structure , and it leads to a discovery of two new bounds. Recall that the access structure array consists of sub-arrays, for any each array is full of the same threshold value .
Lemma 4 (Threshold-Sum-Difference-Bound)
Proof:
The proof can be divided into three parts, each results in a special bound. The detail is in Appendix B-B. ∎
Remark 12
This bound is novel and is important for the (average) information ratio. More specifically, for any structure , the infimum of the information ratio .
Lemma 5 (Threshold-Product-Bound)
For any multiple threshold scheme with the weak secure condition, similar to lemma 1 let be different values chosen from the set , then
(18) |
Proof:
The proof uses induction, where two pattern inequalities are summed at every turn. The detail is in Appendix B-C. ∎
Remark 13
This bound is novel and is used for the information ratio only. More specifically, for any structure , the infimum of the information ratio .
We give a lower bound for the average information ratio using different-threshold-bound and threshold-sum-difference-bound only. Recall that the access structure array consists of sub-arrays, for any each array of them is full of the same threshold value .
Lemma 6
For any multiple threshold scheme under the weak secure condition, the average information ratio is closely related to the a unique threshold value of the access structure array and the number of secrets corresponding to it. More specifically, infimum of the average information ratio
(19) |
Proof:
Remark 14
We will show in the achievability part that this lower bound is tight, which means a specific sub-array of the access structure array plays a central role for the average information ratio and for a fixed threshold value , a suitable number of secrets improves this performance criteria.
As for the information ratio, the above three bounds may not be enough to obtain the optimum results, i.e., efforts in investigating more bounds are needed. For example, consider the structure , a new bound is that
(20) |
Proof:
Remark 15
However, we do not know how to generalize this kind of bound as we care about all possible structure and whether this new bound plays an important role for the information ratio is unclear. In this way, the infimum of the information ratio is claimed for some special cases only as will be discussed in the achievability part.
III-B2 achievability
Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio and even the (average) randomness ratio.
Let and be two positive integers, recall that is a transpose of a Vandermonde matrix from , where is a prime number larger than , means the number of rows and is exactly the set of elements of the second row. When under the weak secure condition, we give the following building block for linear multiple threshold schemes:
Lemma 7
For an multiple threshold scheme whose access structure array consists of only one unique threshold value, i.e., . Let , then is a linear multiple threshold scheme under the weak secure condition where each column corresponds to a random variable, e.g., the first column is , the one is , the one is and so on.
Note that in this way we have and when the number of secrets is bigger than the threshold value.
Proof:
In , any columns are full rank. As , secrets are statistically independent. The decodable condition follows as the threshold value equals the number of rows. Since , the weak secure condition is guaranteed. When , the generator matrix is actually a linear multiple threshold scheme where , from theorem 2 the result follows. ∎
Remark 16
Recall that the access structure array consists of sub-arrays, for any each array of them is full of the same threshold value . Fix an index such that is the maximum among all chooses. It follows from lemma 7 and theorem 2 that is a linear multiple threshold scheme such that , , and we have an upper bound of the infimum of the average information ratio which matches lemma 6 and the optimum is obtained.
Theorem 4
The infimum of the average information ratio is decided by a specific access structure sub-array, more specifically,
(21) |
when under the weak secure condition.
Proof:
The proof follows from the above illustrations. ∎
Remark 17
From this criteria of efficiency of a multiple threshold scheme with the weak secure condition, we can learn that for a unique threshold value , the number of secrets corresponding to is best controlled within . And compared to the strong secure condition, weak one improves the performance by a factor related to the number of secrets, which is also limited by the threshold value.
Theorem 5
As for the information ratio, we obtain the optimal results in three cases only:
-
1.
When , .
-
2.
When , .
-
3.
When there exists only one index such that , .
Proof:
The proof follows from the following illustrations. ∎
In the first case consider different-threshold-bound (16) only, based on which the derivation of the lower bound for the infimum of the information ratio is carried in the following:
(22) |
note that any share index is feasible and secret index is anyone of the set from the sub-array .
The number of participants is fixed to be , and for every sub-array index , introduce an auxiliary access structure array extracted from the original access structure array , we have and is a linear multiple threshold scheme and also for the structure by theorem 2. As the second and third terms of (22) from any such linear scheme are equal. Over a unified finite field whose order is sufficiently large, e.g., bigger than , an independent combination of these generator matrices leads to a linear multiple threshold scheme, which facilitates all four terms in (22) to be equal.
Finally we have when , which means for the information ratio criteria, when the number of secrets corresponding to the same threshold value is within , the number of different threshold values determines the performance.
In the second case we use threshold-product-bound (18) only and apply the same framework above. Similarly for any sub-array index the generator matrix is a building block for structure such that both sides of (18) are equal. The underlying finite fields are unified with a prime number bigger than . Note that the length of every share is equal after any combination since each building block guarantees this property.We still need an independent combination of these building blocks to make the length of every secret to be equivalent.
An example is that for each , consider different permutations of secrets from the same sub-array , then an initial independent combination is a linear multiple threshold scheme such that and . In this way the length of secrets from any sub-array of the access structure array are equal. As for all secrets, for any we firstly independently combine the same for times to get , then the final independent combination is carried on directly.
At last we have when , which means for the information ratio criteria, when the number of secrets corresponding to the same threshold value is bigger than , the influence is individual for different kinds of threshold values, and the more secrets, the less efficiency.
Before introducing the last case, a new special linear scheme needs to be illustrated.
Lemma 8
For the structure such that , there exists a linear multiple threshold scheme satisfying , and . The number of rows of is and the order of the underlying finite field is bigger than and needs to be sufficiently large based on the weak secure condition for secrets in as will be shown in the proof. The specific form of needs the help of and . The former can be divided into sub-matrices each with columns, then the first ones correspond to secrets from the sub-array and the last ones are part of the shares. Similarly the latter can be divided into sub-matrices each with columns, stack the -th sub-matrix with an all-zero one vertically to be a matrix with rows, and then stack the the former part and this matrix horizontally, we get the sub-matrix corresponding to the -th share. Finally consider an identity matrix with columns, stack it with an all-zero matrix vertically to have rows, then the matrix can be divided into sub-matrices each with columns and these matrices correspond to secrets from the sub-array . For example,
(23) |
Proof:
The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix B-E. ∎
Remark 18
This construction is novel and plays an important role for the information ratio and the (average) randomness ratio.
For the third case, both different-threshold-bound (16) and threshold-sum-difference-bound (17) are considered. In this case assume that and , then we combine the two terms of the information ratio with threshold-sum-difference-bound (17) targeted on :
(24) | ||||
(25) | ||||
(26) |
the declaration of and follows (17).
Then we prepare a linear scheme for the structure by independent combination like above. For any the generator matrix is a building block for structure such that both sides of (18) or (17) are equal, so are the building block for the structure when and the building block for the structure if . As the value of minus cased by the latter generator matrices may not be zero. We introduce two more pattern building blocks in order to make the length of every secret to be equivalent, i.e., the generator matrix for the structure , it only fulfills threshold-sum-difference-bound (17), and the generator matrix for structure while this only fulfills different-threshold-bound (16) when .
As in the second case the specific combination coefficients are tedious and by the above introduction of four pattern building blocks we give the conclusion directly. If , ; otherwise, . It means for the information ratio criteria, when the circumstances that the number of secrets corresponding to the same threshold value is bigger than and less than both exist, the optimization is complicated and needs further insight.
IV (Average) randomness ratio
We firstly discuss multiple threshold scheme with the strong secure condition, of which some results can be modified for the weak secure condition.
IV-A strong secure
We firstly discuss a converse result which is fundamental for lower bounds of the (average) randomness ratio when under the strong secure condition.
Lemma 9
For any multiple threshold scheme with the strong secure condition, it holds that .
Proof:
Remark 19
This bound says that when under the strong secure condition, the randomness of any multiple threshold scheme is at least the sum of the product of length of every secret and the corresponding threshold value. This is implied by the work from [12], while our proof may be more read-friendly due to the building block in lemma 1. Then consider the (average) randomness ratio, for any multiple threshold scheme, we apply this bound and it turns out that and , i.e., lower bounds are formed.
As for the achievability part, recall that from one secret to multiple ones, we can imply independent combination of linear threshold schemes to get a linear multiple threshold scheme according to corollary 2. More specifically, given any structure , we prepare a linear threshold scheme based on for any , each of them is also a degradation version of linear multiple threshold scheme with the strong secure condition. The independent combination of these generator matrices leads to a linear multiple threshold scheme with the strong secure condition such that and . Then we have . We also derive an upper bound for the infimum of the average randomness ratio by a single generator matrix , i.e., .
Theorem 6
When under the strong secure condition, the infimum of the randomness ratio and the average randomness ratio .
Proof:
The proof follows from the above illustrations. ∎
Remark 20
The novelty of this theorem compared to the known results of [12] is embedding the two criteria, i.e., the average randomness ratio and randomness ratio. Like the average information ratio, a specific threshold value determines the optimal complexity performance by the average randomness ratio criteria. The more secrets, the more complexity.
IV-B weak secure
IV-B1 converse
We firstly discuss some converse results that are fundamental for lower bounds of the (average) randomness ratio when under the weak secure condition.
Lemma 10 (Threshold-Value-Bound)
For any multiple threshold scheme with the weak secure condition, for any secret index of the sub-array , it holds that
(27) |
Proof:
Remark 21
Recall that the access structure array can be divided into different sub-arrays based on unique threshold values. In this way threshold-value-bound says that the randomness of any multiple threshold scheme is at least the sum of the product of length of different kinds of secret and the corresponding threshold values, which is a weak version of lemma 9 due to the weak secure condition. This bound is novel as we investigate randomness under the weak secure condition. We find that it is crucial for the (average) randomness ratio. Consider the different permutations of threshold-value-bound, the sum is equivalent to the following bound
(28) |
When under the weak secure condition, there is another novel bound similar to threshold-sum-difference-bound (17).
Lemma 11 (Threshold-Sum-Bound)
For any multiple threshold scheme with the weak secure condition, fix an index , similar to lemma 3 let index be any element of the set , then
(29) |
Proof:
The proof can be divided into two parts, each results in a special bound. The detail is in Appendix C-B. ∎
Remark 22
We find that it is crucial for the (average) randomness ratio. Consider the total different permutations of threshold-sum-bound, the sum is equivalent to the following bound
(30) |
IV-B2 achievability
Then we discuss some linear schemes that are crucial for upper bounds of the (average) information ratio.
Recall that linear scheme like in definition 5 and lemma 7 for multiple threshold scheme under the (strong) weak secure condition is already known by the information theory community, and in the last section we propose a new generator matrix which can be seen as a modified version of for specific structure. Here we continue this idea and give the following lemma.
Lemma 12
For the structure such that , there exists a linear multiple threshold scheme where integer such that , and , here are different values chosen from the set . The number of rows of is and the order of the underlying finite field is bigger than . The specific form of needs the help of and . The former can be divided into sub-matrices each with columns, then the first ones correspond to secrets from the sub-array , the next ones for shares and the last ones are part of the other shares. Similarly the latter can be divided into sub-matrices each with columns, stack the -th sub-matrix with an all-zero one vertically to be a matrix with rows, and then stack the the former part and this matrix horizontally, we get the sub-matrix corresponding to the -th share. For example,
(31) |
Proof:
The proof is carried by checking the system conditions of the definition of linear multiple threshold scheme. The detail can be found in Appendix C-C. ∎
Remark 23
This construction is novel, has different size of shares and plays the extreme direction role [19] for the projection when . When , the cases for are not extreme directions as the threshold-sum-difference-bound (17) is unique, while the case that is an extreme direction. Recall that for a fixed structure with , in the -dimension Euclidean space we denote the coordinates related with shares and secrets by , and the projection is from the polyhedral cone formed by the Shannon-type inequalities and system conditions of the structure .
Consider the average randomness ratio firstly and there are two cases. Recall that the access structure array consists of sub-arrays.
The first one is that for any structure when there at least exists one index satisfying . We use threshold-sum-bound (29) for and have a lower bound of the infimum of the average randomness ratio . Then the corresponding linear scheme can be or for the structure by theorem 2 and it turns out that . The optimum is claimed and means that no additional randomness is needed in this case for the weak secure condition.
The second case is the opposite, that is, for every index , the number of secrets corresponding to the same threshold value is less than , i.e., . Use the permutation version of threshold-value-bound (28) we have . Assume is the index matching this minimum value, a linear scheme for the structure leads to the upper bound . The optimum is claimed and means that under the weak secure condition we can benefit from the number of secrets corresponding to the same threshold value when consider randomness.
Theorem 7
For any structure , the infimum of the average randomness ratio
(32) |
Proof:
The proof follows from the two cases mentioned above. ∎
As for the randomness ratio, still two cases will be discussed.
Similarly the first case is that the number of secrets corresponding to the same threshold value is bigger than , fix the smallest index from to be . Introduce the permutation version of threshold-sum-bound (30) towards and we have a lower bound of the infimum of the randomness ratio . For any index we prepare for the structure , the linear scheme is for the structure and for every index , if , the generator matrix is used; otherwise, we only prepare or . Let the order be sufficiently large we have a unified finite field, and the independent combination of these generator matrices leads to a linear multiple threshold scheme under the weak secure condition such that . Finally the optimum is claimed and we can indeed learn that more secrets help to reduce randomness.
The second case is still the opposite, that is, for any index , . Use the permutation version of threshold-value-bound (28) we have . We prepare a generator matrix for every sub-array . Still let the order be sufficiently large, over the unified finite field the independent combination of these generator matrices leads to . The optimum is claimed.
Theorem 8
For any structure , the infimum of the randomness ratio
(33) |
where b depends on the access structure array . More specifically, if there exists an index such that , let be the smallest such index minus 1; otherwise, .
Proof:
The proof follows from the two cases mentioned above. ∎
V Conclusions and future direction
strong | weak | |
Unknown | ||
In table I we conclude the results of the four ratios. We can see that when under the weak secure condition, multiple threshold scheme has improved performance of both efficiency and complexity, compared to the strong secure condition.
When under the weak secure condition, we find that these three new bounds come from the case that the number of secrets corresponding to the same threshold value is lager than . As leaded by corollary 1, we conjecture that the projection may have all patterns of bounds, where , with , and . However, existing numerical experiments may be difficult to carry on due to the tremendous number of the Shannon-type inequalities involved. So the bound (20) may also be a good direction to attack.
Appendix A proofs for problem formulation
A-A proof of theorem 1
Let and for ease of notation.
Form a set of excluded secrets and recall that is the set of random variables. For any vector , there exists a vector such that , where is a vector extracted from the original vector according to the coordinates of the region . More specifically, for any non-empty , let , where and means the difference of two sets, in this way it follows that . The vector satisfies the Shannon-type inequalities since for , and for , . because . With the degeneration of the secrets in the set from the construction of the vector and by the definitions of decodable condition and (strong) weak condition similar to the independent assumption of all secrets, we have . Finally, .
For any vector , from which extract a vector according to the coordinates of the region . As satisfies the Shannon-type inequalities for random variables, it follows that by the definitions of non-decreasing and submodular properties. With the help of the Shannon-type inequalities, we have and , then . For , similarly we have and when , it follows that , then . For three disjoint sets , we have and when , it follows that , then if we consider the strong secure condition, . The case of follows for reasons similar to the Shannon-type inequalities for different numbers of random variables above. Hence we have .
A-B proof of theorem 2
Note that we have assumed all vectors of any sub-matrix of a generator matrix are linear independent, if is all-zero, we call such matrix a dummy one since . Form a set of excluded secrets . We have already known that the generator matrix satisfies the system conditions of the structure , and we will show that after the construction of dummy matrices for the set of excluded secrets , is also for .
For the independent assumption of secrets, , the first equation is from the all-zero matrices, the second is by the property of and the third is still via the dummy construction. If we have under the decodable condition, from the dummy construction it follows that , which is enough for the structure . Similarly consider the (strong) weak secure condition, if , as the additional matrices are all-zero, , which is also sufficient.
Appendix B proofs for (average) information ratio
B-A proof of lemma 2
Recall that the access structure array has sub-arrays, each of them is denoted by full of , the same threshold value of the corresponding set of secrets . In this way the non-increasing property of says that .
Based on corollary 1, we introduce an auxiliary access structure array . More specifically, has sub-arrays with , and the length of each is larger than or equal to the corresponding sub-array of , i.e., for any , if there exists such that , then ; otherwise, . Then our proof is towards the structure , and the result for the structure will be obtained from truncation.
For any , from the strong secure condition (3), for all with , we have that ; and from the decodable condition (2), for all with , it holds that . Substitute the single secret from lemma 1 by the set of secrets , we have
where we use the relation that due to the continuous nature.
And the boundary case is that
B-B proof of lemma 4
Still we use plain number instead of index like as in the proof of lemma 1 for simplicity, and an auxiliary access structure array is introduced like the proof in lemma 2. More specifically, the access structure array consists of continuous natural numbers from to , we replace the starting index by , i.e., , in this way we have from the relation . Fix an index , three parts of inequalities will be presented.
The first part is about the right hand side of secrets , based on the bound of lemma 1, for any index , we prepare inequalities in the following:
Then the sum of these inequalities leads to the following bound
(34) |
Note that , and . This concludes the first part and note that if the initial choose equals the last element of the auxiliary access structure array , i.e., , this part is ignored.
The second part includes the secrets compared to the fist part, i.e., the secrets are considered here. When , based on the non-negativeness of conditional mutual information, we list inequalities in the following:
Consider the sum of these inequalities and recall the decodable condition (2), substitute by , for any replace the conditional entropy by , and via the independent assumption of secrets (1) we finally have
(35) |
When we use by the decodable condition directly.
The third part considers the rest secrets, i.e., . Still based on the bound of lemma 1, for any index , inequalities are prepared in the following:
For the boundary case , we introduce conditional entropy bounds instead of conditional mutual information ones like the boundary part in the proof of lemma 2.
Then the sum of these inequalities leads to the following bound
(36) |
This concludes the third part and note that if the initial choose equals the first element of the auxiliary access structure array , i.e., , or for short, this part is ignored.
B-C proof of lemma 5
Recall that the access structure array has sub-arrays, if , this bound follows by .
When , we introduce an auxiliary access structure array as in lemma 2. More specifically, has sub-arrays with , and the length of each is larger than or equal to the corresponding sub-array of , i.e., for any , if there exists such that , then ; otherwise, . Then our proof is towards the structure , and the result for the structure will be obtained from truncation and dividing the same positive integer in both sides of the inequality.
For every , we prepare a pattern inequality which is rewritten from the bound (35), one of the three ingredients for the threshold-sum-difference-bound:
(37) |
The core idea is that special permutations of every pattern inequality except the first one are summed to cancel the entropies of shares. More specifically, the term can be permuted to cancel the term of a new pattern inequality ahead, also this pattern inequality for can be multiplied to maintain integral coefficients. Such induction procedure leads to
(38) |
Note that similar to the case , , due to the assumption of mutually independent secrets, the permutation of indices of shares and the truncation technique from corollary 1, the final result follows.
B-D proof of lemma 6
The proof is carried via case analysis where two cases are involved.
The first case is that for every , the length of the sub-array is not bigger than the unique threshold value of it, i.e., . Assume , then we introduce an auxiliary access structure array such that . Note that the number of all different different-threshold-bounds (16) is , the sum of them is the following:
Based on the technique of truncation as in corollary 1 we have .
Another case is the opposite, i.e., there at least exists one sub-array such that the length of it is strictly bigger than the corresponding threshold value, assume the first one is and then where is the empty set. In this way let and due to the non-increasing assumption of the access structure array it follows that for any , . The auxiliary access structure array is constructed similarly, and the unique threshold values are the same. We only use the first two parts in the left hand side of threshold-sum-difference-bound (17), i.e., such relaxation ignores the difference part. Consider the permutation of secrets firstly, the sum of such inequalities for fixed different shares is the following:
note that when , the first part in the left hand side is ignored and in the second part; if , we relax the coefficient of the second part to be . Finally consider the permutation of shares, the sum is the following:
Still based on the truncation we have .
B-E proof of lemma 8
Note that in a Vandermonde matrix any sub-matrix is full rank. Denote by for short.
For all secrets we have as the identity matrix in the upper right corner of is full rank, so is the sub-matrix in the lower left corner since it is the sub-matrix of a Vandermonde matrix, and that the lower right corner is all-zero facilitates applying Gaussian-Elimination to obtain rank.
For any split the matrix corresponding to share into two parts, that is, let be the first columns and the last columns form .
As for decodable condition, firstly note that the rank of the matrix formed by any shares like equals the number of rows of . The reason is that the upper rows of the matrix , which is the concatenation of the right part of every horizontally, is full rank as the number of columns is bigger than that of rows, then consider the lower rows of the matrix , it is full rank and such lower rows of are all-zero. In this way we have , which is also the value of . Secondly consider the matrix formed by any shares like , of which the upper rows of the matrix are full rank and the other rows are all-zero. The upper rows of the matrix corresponding to the secrets are full rank and the other rows are all-zero. As , then every column of equals a linear combination of the columns from , we have .
At last consider weak secure condition. The rank of the matrix formed by any shares like equals since both and lower rows of are full rank, the lower all-zeros rows of facilitate this observation by Gaussian-Elimination. Stack the matrix corresponding to any secret and horizontally, note that the former is extracted from , similarly we have . Then we need to focus on the matrix formed by any shares like . The part follows the same procedure as for shares.
The case for any secret is not straightforward like before. Recall the matrix corresponding to secret , it has an identity matrix embedded between the -th row and the -th row, the other elements of are all-zero. Stack it with horizontally, for weak secure condition we only need to consider the rank of a special matrix extracted from , i.e., the concatenation of the first rows and rows between the -th row and the -th row. The determinant of this matrix is related to Schur polynomials [20] which is not when the order of the underlying finite field is sufficiently large. For example we can calculate the specific determinants in real number field for all cases, any of which is the product of the sum of monomials and Vandermonde determinant, thus bigger than zero, finally choose the finite field order to be larger than any determinant. In this way .
Appendix C proofs for (average) randomness ratio
C-A proof of lemma 9
Recall that the access structure array has sub-arrays, each of them is denoted by full of , the same threshold value of the corresponding set of secrets . In this way the non-increasing property of says that .
Based on corollary 1, we introduce an auxiliary access structure array . More specifically, has sub-arrays with , and the length of each is larger than or equal to the corresponding sub-array of , i.e., for any , if there exists such that , then ; otherwise, . Then our proof is towards the structure , and the result for the structure will be obtained from truncation.
If , for any , from the strong secure condition (3), for all with , we have that ; and from the decodable condition (2), for all with , it holds that . Substitute the single secret from lemma 1 by the set of secrets , for any index where we use the relation that due to the continuous nature, inequalities are prepared in the following:
For the boundary case , we introduce conditional entropy bounds instead of conditional mutual information ones like in the proof of lemma 2.
Then the sum of these inequalities leads to the following bound
(39) |
If , similarly consider the above conditional entropy bounds and the second part in the proof of threshold-sum-difference-bound (17). The sum leads to
(40) |
C-B proof of lemma 11
Still we use plain number instead of index like as in the proof of lemma 1 for simplicity, and an auxiliary access structure array is introduced like the proof in lemma 2. More specifically, the access structure array consists of continuous natural numbers from to , we replace the starting index by , i.e., , in this way we have from the relation .
When we use by decodable condition directly. Otherwise fix an index , two parts of inequalities will be presented.
The first part considers the secrets . Based on the non-negativeness of conditional mutual information, we list inequalities in the following:
Consider the sum of these inequalities and recall the decodable condition (2), substitute by , for any replace the conditional entropy by , and via the independent assumption of secrets (1) we finally have
(41) |
The second part considers the rest secrets, i.e., . Still based on the bound of lemma 1, for any index , inequalities are prepared in the following:
For the boundary case , we introduce conditional entropy bounds instead of conditional mutual information ones like in the proof of lemma 1.
Then the sum of these inequalities leads to the following bound
(42) |
C-C proof of lemma 12
Note that in a Vandermonde matrix any sub-matrix is full rank. Denote by for short.
For all secrets we have since it is the sub-matrix of a Vandermonde matrix.
For any shares, we have different columns extracted from and at least different columns from stacked with an all-zero matrix. From this view stack these two matrices horizontally, we can see that the upper right corner is full rank, so is the sub-matrix in the lower left corner since both are the sub-matrices of Vandermonde matrices, and that the lower right corner is all-zero facilitates applying Gaussian-Elimination to obtain the decodable condition, i.e., where denotes any shares.
For any shares, we have different columns extracted from , regardless of the number of participants we assume there are at most different columns from stacked with an all-zero matrix. From this view stack these two matrices horizontally and denote any shares by we can see that as and following the similar procedure in decodable condition above. Then consider any secret, we have different columns extracted from , stack these two matrices horizontally and the final matrix is still full rank. Finally we have .
When we find that any columns from form an square matrix which is full rank. Then this part can be substituted by an identity matrix and the order of the underlying finite field may be smaller.
References
- [1] Adi Shamir. How to share a secret. Communications of The ACM, 22(11):612–613, 1979.
- [2] D. R. Stinson. An explication of secret sharing schemes. Designs, Codes and Cryptography, 2(4):357–390, 1992.
- [3] Wen-Ai Jackson and Keith M. Martin. Perfect secret sharing schemes on five participants. Designs, Codes and Cryptography, 9(3):267–286, 1996.
- [4] Oriol Farràs, Tarik Kaced, Sebastià Martín, and Carles Padro. Improving the linear programming technique in the search for lower bounds in secret sharing. IEEE Transactions on Information Theory, 66(11):7088–7100, 2020.
- [5] Carles Padró. Lecture notes in secret sharing. IACR Cryptology ePrint Archive, 2012:674, 2012.
- [6] Carlo Blundo, Alfredo De Santis, and Ugo Vaccaro. Randomness in distribution protocols. Information and Computation, 131(2):111–139, 1996.
- [7] Oriol Farràs, Ignacio Gracia, Sebastià Martín, and Carles Padró. Linear threshold multisecret sharing schemes. Information Processing Letters, 112(17-18):667–673, 2012.
- [8] Chun-ming Tang and Shu-guang Dai. The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures. Acta Mathematicae Applicatae Sinica, English Series, 30(4):1073–1084, 2014.
- [9] Gustavus J Simmons. An introduction to shared secret and/or shared control schemes and their application. 1992.
- [10] Ali Khalesi, Mahtab Mirmohseni, and Mohammad Ali Maddah-Ali. The capacity region of distributed multi-user secret sharing. IEEE Journal on Selected Areas in Information Theory, 2(3):1057–1071, 2021.
- [11] Mahdi Soleymani and Hessam Mahdavifar. Distributed multi-user secret sharing. IEEE Transactions on Information Theory, 67(1):164–178, 2020.
- [12] Alfredo De Santis and Barbara Masucci. Multiple ramp schemes. IEEE Transactions on Information Theory, 45(5):1720–1728, 1999.
- [13] Javier Herranz, Alexandre Ruiz, and Germán Sáez. New results and applications for multi-secret sharing schemes. Designs, codes and cryptography, 73(3):841–864, 2014.
- [14] Robert J. McEliece and Dilip V. Sarwate. On sharing secrets and reed-solomon codes. Communications of the ACM, 24(9):583–584, 1981.
- [15] Ehud Karnin, Jonathan Greene, and Martin Hellman. On secret sharing systems. IEEE Transactions on Information Theory, 29(1):35–41, 1983.
- [16] László Csirmaz. How to share secrets simultaneously. Cryptology ePrint Archive, 2011.
- [17] Zhen Zhang and R.W. Yeung. On characterization of entropy function via information inequalities. IEEE Transactions on Information Theory, 44(4):1440–1452, 1998.
- [18] Bohdan L Kaluzny. Polyhedral computation: a survey of projection methods. 2002.
- [19] Bob Pakzad-Hurson, Greg Ference, Veselka Kafedzhieva, Michael Cline, Akinwale Akinbiyi, Ethan Wright, Richard Benjamin, and Douglas Mercer. Linear programming: Penn state math 484 lecture notes. 2014.
- [20] Amritanshu Prasad. An introduction to schur polynomials. arXiv preprint arXiv:1802.06073, 2018.