Additive Secret Sharing

Summary

Additive secret sharing is the simplest secret sharing scheme. It splits a secret into \(n\) shares such that all \(n\) shares are required for reconstruction (an $n$-out-of-\(n\) access structure). It requires only an abelian group \((\mathbb{G}, +)\) and achieves information-theoretic security.

Definition

Given a secret \(s \in \mathbb{G}\) and \(n\) parties, the dealer:

  1. Samples \(s_1, \ldots, s_{n-1} \leftarrow{} \mathbb{G}\) uniformly at random.
  2. Sets \(s_n = s - \sum_{i=1}^{n-1} s_i\).
  3. Distributes share \(s_i\) to party \(i\).

Reconstruction. All \(n\) parties combine their shares: \(s = \sum_{i=1}^{n} s_i\).

Security. Any subset of at most \(n - 1\) shares is uniformly distributed over \(\mathbb{G}^{n-1}\) and independent of the secret \(s\). The security is information-theoretic: no computational assumptions are needed, and the guarantee holds against unbounded adversaries.

Notes

  • Only requires an abelian group \((\mathbb{G}, +)\). No field structure is needed, unlike Shamir secret sharing [1] which relies on polynomial interpolation over a finite field.
  • The group \(\mathbb{G}\) must be finite with \(|\mathbb{G}| \geq 2\) for non-trivial security.
  • Additive secret sharing is a special case of Shamir secret sharing with threshold \(t = n\).
  • The concept of secret sharing was introduced independently by Shamir [1] and Blakley [2]. The additive variant is folklore.
  • Commonly used in two-party computation protocols (e.g., GMW [3], garbled circuits with secret-shared inputs) and as a building block in multi-party computation protocols such as BGW [4].

References

[1] Adi Shamir. 1979. “How to share a secret.” https://dl.acm.org/doi/10.1145/359168.359176.
[2] G. R. Blakley. 1979. “Safeguarding cryptographic keys.” https://www.computer.org/csdl/proceedings-article/afips/1979/50870313/12OmNCeK2a1.
[3] O. Goldreich, S. Micali, and A. Wigderson. 1987. “How to play ANY mental game.” https://dl.acm.org/doi/10.1145/28395.28420.
[4] Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. “Completeness theorems for non-cryptographic fault-tolerant distributed computation.” https://dl.acm.org/doi/10.1145/62212.62213.