1. Introduction
Secret sharing schemes were introduced by Shamir in 1979 [
1]. A
-secret sharing scheme is a method of distribution of information among
n participants such that
can reconstruct the secret but any
cannot.
The person distributing the shares is called the dealer and a minimal
t-subset of participants that can reconstruct the secret is called a coalition. Shamir scheme was based on polynomial interpolation but was later shown by McEliece and Sarwate to be an application of the Massey scheme, a scheme based on codes [
2], to Reed-Solomon codes [
3].
In the present work, we present a ramp secret sharing scheme based on polynomial residue rings. It was shown in [
4] that such schemes can be concatenated with a classical
-scheme. Thus, our scheme complements but does not compete with Shamir scheme for instance. We generalize and sometimes correct the results of [
5]. To determine the residue rings where our scheme can be applied, we are led to characterize all finite commutative rings that are
These are defined by the property that the sum of all their elements is zero. This result is of independent algebraic interest. When the residue ring is a finite field, to study the size distribution of admissible coalitions, we are led to study the weight distribution of a coset of shortened Hamming codes. The analysis employs the MacWilliams formula and the fact that Hamming codes are homogeneous.
The material is organized as follows.
Section 2 discusses
rings.
Section 3 describes the scheme, and analyzes its security.
Section 4 collects concluding remarks and open problems.
2. Algebraic Preliminaries
The aim of the first three subsections is to characterize commutative rings for which the sum of all elements is zero.
2.1. Integer Residue Rings
We begin with a lemma on integer residues.
Lemma 1. If N is an odd integer, then is an integer divisible by
Proof. Summing an arithmetic series yields Since N is odd, the number is an integer. □
Remark 1. Note that the result does not hold for even integers. For instance, is not a multiple of In fact, the sum is congruent to modulo
We proceed to generalized the above result to polynomial residue rings. Let q be an arbitrary integer Let f denote a polynomial of degree d in and denote by the quotient ring
Theorem 1. If q is odd and or q is even and then
Proof. If
and
q is odd, the preceding Lemma applies with
If
, write the residue class representative
h as
We see that, for given i, any fixed value of will appear times when the s with range over The result follows since then □
2.2. Zero-Sum Sets
We want to exhibit the sum of all elements of which is zero, but without smaller size zero-sum sets. The next result shows that composite q’s should be avoided.
Lemma 2. Assume If m divides q, then has a zero-sum set of size
Proof. Writing and we see that embeds additively into by the map Thus, by Theorem 1 applied to has a zero sum-set of size □
Next, we show that composite f’s should be avoided.
Lemma 3. Assume If h of degree divides f, then has a zero-sum set of size
Proof. Writing and we see that embeds additively into by the map Thus, by Theorem 1 applied to has a zero-sum set of size □
Eventually, should not be composite.
Lemma 4. Assume and that If s divides then has a zero-sum set of size
Proof. In that case, the multiplicative group of contains s roots of unity of order which add up to zero. □
2.3. Generalization to Rings
Proposition 1. If the ring R contains a unit u such that is also a unit, then R is
Proof. Let Since u is invertible, then the map permutes Thus, and so □
Remark 2. The condition is sufficient but not necessary as the ring is and contains only one unit Thus, which is not a unit.
The following result is well-known.
Corollary 1. Every finite field except is
Proof. If , any nonzero element is such that is invertible. □
The following result shows that many rings are
Corollary 2. Every ring of odd characteristic is
Proof. If the characteristic is odd, then is a unit and also . □
We are still far from a characterization as there are many even characteristic
rings, like e.g., the direct product
A complete characterization was given in [
6]. To be self-contained, we sketch a proof here.
Theorem 2. A commutative ring is not iff its additive group contains only one summand of even size in its decomposition as a direct sum of cyclic groups.
Proof. The sum of all the elements of a finite abelian group G is equal to the sum of elements of order Call the set consisting of 0 and the elements of order The set is an abelian group, or, equivalently, a vector space over of dimension say. Thus, the set of all elements of is zero iff it is the case for By Corollary 1, this happens iff iff Thus, G contains exactly one element of order This happens iff it contains only one summand of even size in its fundamental decomposition as a direct sum of cyclic groups. □
2.4. Secret Sharing Schemes
Definition 2. (Minimal Access Set) A subset of participants is called a minimal access set, if the participants in the subsets can recover the secret by combining their shares, but any subset of these can not do so [7]. Definition 3. (Access Structure) The access structure of a secret sharing scheme is the set of all minimal access sets [7]. Definition 4. (Ramp Secret Sharing Scheme) Ramp secret sharing scheme (RSS) is a relaxation of secret sharing scheme. In a RSS of parameters with , all t-subsets can reconstruct the secret, no j-subsets with can reconstruct the secret, and some j-subsets with can reconstruct the subset. There is a lot of work on the ramp secret sharing scheme. Some of them are given in [8,9]. Alahmadi et al. [8] explain a multisecret-sharing scheme based on LCD codes. They use Blakley’s method to construct their scheme. Çalkavur and Solé [9] introduce some multisecret-sharing schemes over finite fields. In their work, they claim that the Blakley scheme does not work well if they replace with a finite field. These two schemes are also the ramp secret sharing schemes. 3. The Scheme
Assume a polynomial residue ring that satisfies the hypothesis of Theorem 1 and construct a threshold scheme based on this ring. Put with . We construct an -ramp scheme. The motivation for this special choice of is as follows. From the three Lemmas above, the recommended values of in the notation of §II are
f irreducible
prime
.
The primes of the form
are called Mersenne primes. The first few admissible
s are
The largest known in April 2020 was for
d = 82,589,933 [
10]. For that value of
the quantity
is the largest known prime today.
The share dealing protocol proceeds as follows:
All of the elements of are written as binary vectors of length d.
The dealer pics any element of as the secret.
He distributes the remaining elements of to the users.
The recovery phase is as follows. The set of all users pool their shares together, and add them up obtaining a sum Thus, the secret is then computed as We summarize the discussion in the following proposition.
Proposition 2. With the above conditions, the finite field determines a -ramp secret sharing scheme.
Proof. By Corollary 1, the finite field is . Anticipating the next section, we see that the zero sum sets of are in bijection with the codewords of the Hamming code of parameters This means, in the scheme, there are participants, and the secret is split in pieces and there are zero-sum set of size 3 corresponding to weight 3 codewords in Hamming scheme. The results follow. □
3.1. Coding Interpretation
The following result is elementary but essential. A coalition is any zero-sum set containing the secret, minus the secret itself.
Proposition 3. There is a bijective correspondence between coalitions of size w and codewords of weight in the Hamming code of parameters
Proof. Let
H be the matrix with columns all the
nonzero binary vectors of length
As is well-known [
11], this matrix is a parity-check matrix for the said Hamming code
Let
C be a coalition, and let
be the characteristic vector of
where
s denotes the secret. Since
is a zero-set, we know that
implying
Furthermore,
equals the Hamming weight of
. □
3.2. Random Choice Attack
An obvious attack is to suppose a coalition with a zero-set containing the secret minus the secret, and let the members of the coalition add up their shares. The following result is immediate by the coding interpretation of Proposition 3. Denote by the code obtained from by puncturing in an arbitrary position, and only retaining the codewords which were equal to one in that position. In other words, it is the coset of the shortened code into the punctured code at the same position.
Proposition 4. The probability that a random set of size w is a coalition is where is the number of codewords of weight w in
Proof. By Proposition 3, the characteristic vector of a coalition is a codeword of where the puncture has been done at the coordinate place determined by the secret. □
The
’s can be computed by the generating function:
(coming from ([
12] Th. 3)), where
the weight enumerator of
is easily computed by MacWilliams transform:
using the fact that the dual of the Hamming code, the so-called Simplex code is a one-weight code ([
11] Chap. 5, Prob. 3).
Example 1. For small values of d, a direct computation in Magma [13] yields the following data. The weight distribution is described as a listWe consider when is a code. The weight distribution of punctured at coordinate 1 is
The weight distribution of shortened at coordinate 1 is
On the contrary, we see that the weight distribution of is
Higher values of d (say e.g., ) are feasible but lead to longer formulas.
To be concrete, we give a special case.
Proposition 5. In this scheme, there are coalitions of size
Proof. By Proposition 3, such an access set is of the form where s is the secret and x is an arbitrary nonzero vector different from Replacing x by gives the same set. □
These calculations show that the value of n should be large for the scheme to be secure.
3.3. Information Rate
Another important parameter in secret sharing is the information rate
of the scheme. It is equal to the ratio of the size of the secret to the maximum size of the pieces of participants [
14]. Since the secret is an element of length
d in
, its size is
d. Thus, the information rate is 1.
If the information rate is equal to one, then this scheme is called the ideal. Thus, our new scheme is an ideal secret sharing scheme.
3.4. Comparison with Other Schemes
Let
denote the finite extension of degree
n of the finite field
. Now, we compare our scheme with other ramp type schemes in the
Table 1. The number of participants, the size of a secret, and the number of coalitions for an
-code over
are denoted by
, respectively. Moreover, consider a polynomial residue ring
.
3.5. Combination with Shamir’s Scheme
The advantage of using a secret with values in a finite field is that it can be used in conjunction with Shamir’s scheme which is based on polynomial interpolation over a finite field.
4. Conclusions
In the present article, we have generalized the work [
5] to a wider class of quotient rings. Possible attacks have been considered. Secure values of
have been recommended. Even in the recommended values of the parameters, there are still zero sum-sets of size
Moreover, our scheme has the same distributed secret as Shamir’s scheme does. We send the residue classes in disguise over open channels and then participants use properties of zero-sum sets to recover the secret. The combined scheme has the following useful advantages over Shamir’s original scheme:
The shares are elements of a polynomial residue ring that can be sent over open channels and then participants use ring-theoretic methods to recover the secret.
Once the long-term private information (the share) is distributed, several different secrets can be distributed without updating the long-term private information.
While recovering the secret, if participants do not want to, they do not have to reveal their shares to each other.
On the combinatorial side, it would be interesting to derive an upper bound on the size of nontrivial zero-sum sets in . Characterizing the distribution of zero-sum sets in general commutative rings seems to be a challenging problem in ring theory, as it cannot use the standard decomposition theorems, like CRT and so on.