In secret sharing, the relationships between participants and the information they hold can be modeled effectively using graph structures. Graphs allow us to visualize and analyze these relationships, making it easier to define access structures, optimize share distributions, and ensure security. This paper provides the first comprehensive review of existing research on the application of graph theory to secret sharing comparing different classic and modern approaches and analyzing the current litterature. Through this study we highlight the key advances and methodologies that have been developed, underscoring the pivotal role of graph theoretic approaches in enhancing the security and efficiency of secret sharing schemes. Furthermore, the review identifies open challenges and future research directions, providing insights into potential innovations that could further strengthen cryptographic practices. This work serves as a foundational resource for researchers and practitioners seeking to deepen their understanding of the intersection between graph theory and secret sharing, fostering the development of more robust and sophisticated cryptographic solutions.
Secret sharing emerges as a fundamental technique in information security designed to enhance data protection and ensure reliability across various applications. This cryptographic technique involves dividing a secret into multiple pieces or shares, then distributed among a group of participants. The primary objective is that only some authorized subsets of participants can reconstruct the original secret, while unauthorized subsets are left with no useful information.
First formalized independently by Adi Shamir [37] and George Blakley [7] in 1979. Shamir’s scheme is based on
polynomial interpolation over a finite field, where a secret is encoded
as the constant term of a polynomial. In contrast, Blakley’s approach
utilizes a geometric approach, where the secret is represented as a
point of intersection in a multidimensional space. Both schemes laid the
groundwork for a wide array of secret sharing protocols, each tailored
to specific requirements and security constraints. Ito et al. [25] generalized the idea of
secret sharing by presenting the notion of access structure that
specifies which groups of participants are authorized to reconstruct the
secret. Formally, an access structure
Secret sharing has since been applied in diverse areas such as secure multiparty computation [33,35], oblivious transfer [44] and distributed systems [39,21], etc. Its versatility makes it an essential tool in scenarios where trust and security are paramount. For instance, in financial institutions, secret sharing is employed to protect cryptographic keys, ensuring that no single individual holds complete control over sensitive operations. Similarly, in cloud computing, it facilitates secure data storage and access control [29,36], mitigating the risks associated with single points of failure. It was shown that any access structure can be realized by a perfect secret sharing scheme [25,6], but the size of shares was not seriously been taken in consideration. Secret sharing presents several challenges, particularly in terms of efficiency and scalability. As the size of the participant group grows, managing the distribution and reconstruction of shares becomes increasingly complex. This has prompted ongoing research into optimizing secret sharing schemes to balance security with practical implementation.
Many reviews and surveys on secret sharing has been appeared in the litterature over the years [5,34,13,38], Beimel [5] surveyed secret sharing schemes in cryptography and distributed computing, more specified reviews appeared later in the litterature, Sarosh et al [34] explore secret sharing schemes based on polynomials, the Chinese Remainder Theorem, matrix projections, and visual secret sharing for secure communication and image sharing, while threshold secret sharing (TSS) and its extensions like multi-secret sharing and verifiable secret sharing were reviewed in [13], but as the best as we know, no one of those reviews explicitly studied the graph theory approach. This gap in the literature highlights a lack of comprehensive analysis of how graph theory can be applied to secret sharing schemes. Therefore, there appears to be no existing review that addresses this perspective, presenting an opportunity for future research to explore the intersection of graph theory and secret sharing.
We categrize the use of graph theory in secret sharing into classical and modern approaches, each bringing unique insights and methodologies. The classical approach primarily revolves around matrix characterizations of SSS and decomposition constructions, where the focus is on breaking down the graph into simpler components that facilitate efficient secret distribution and recovery. These techniques leverage the structural properties of graphs to ensure minimal and secure access structures. On the other hand, the modern approach encompasses more advanced methods, such as multipartite secret sharing, linear secret sharing schemes, and an emphasis on computational complexity. These modern techniques provide more flexibility and efficiency, particularly in scenarios requiring fine-tuned control over share sizes, information rates, and security guarantees, aligning well with contemporary cryptographic needs.
We start in Section 2 with highlighting some needed preliminaries for the rest of the paper. In the Section 3, we compare the strengths and limitations of each delves into the classical approach, highlighting, comparing and analysing seminal works and key theorems that have shaped the understanding of graph based secret sharing schemes. Modern approaches, showcasing recent advancements and innovative methods in the field are discussed in fourth section. In addition, the focus shifts to hypergraph construction, presenting advanced techniques and their applications in improving the efficiency of secret sharing schemes. Finally, the last section summarizes the main points and reflecting on the broader implications of the research. he complex landscape of secret sharing and graph theory.
In the remainder of the paper, we will use the notations listed in Table 1 below:
Description | |
|
Graph |
|
The complete graph on |
|
The complete multipartite graph |
|
Cycle on |
|
Path on |
|
Tree |
|
The maximum degree of the graph |
|
Entropy of random variable |
|
Secret Sharing Scheme |
|
Linear Secret Sharing Scheme |
|
Complete Multipartite Covering |
|
Access structure in a secret sharing scheme |
|
The set of possible secrets |
|
The set of possible shares |
|
Number of participants in the scheme |
|
Information rate of a SSS realizing |
|
Average Information rate of a SSS realizing |
This section provides a brief overview of the key concepts necessary for understanding the results discussed in this paper. These foundational topics form the basis for exploring the connections between cryptographic secret sharing schemes and graph theory or more generally combinatorial structures. Readers interested in a deeper dive into these subjects are encouraged to consult standard texts on graph theory [9,20,24], information theory [15], and matroid theory [30].
A simple graph
A secret sharing scheme allows a secret to be distributed among
Ito et al. [25] proved that for any access structure there
exists a perfect SSS realizing it. The optimal information rate
Let
A
The entropy
Secret sharing schemes (SSS) where charcterized in terms of matrices
of
Brickell and Stinson used the matrix characterization to deduce that
for any graph
In his paper “the size of a share must be large” [18], Csirmaz improved the upper bound found by Capocelli et al. [12], and introduced tighter lower bounds using polymatroids. He defined a polymatroid function to model the entropy relationships between the secret and the participants’ shares. The paper further explores the properties of this polymatroid function to derive the following result.
Based on the same entropy-theoretical arguments, another improvement
of these results [17]
was achieved by constructing a graph with average information rate less
than
Blundo et al. [8]
developped a construction called graph decomposition that consists of
decomposing a graph
Let
This construction can be generalized into multiple CMC’s of the same
graph instead of a single CMC, it was shown that for
For the path
For paths
For cycles
For any tree
For any connected graph hich is not complete multipartite, the
average information rate
For the 30 connected graphs on at most 5 vertices, and using the CMC construction, the exact optimal information rate and average information rate are determined in most cases, with good upper and lower bounds for the remaining cases.
This construction uses small secret sharing schemes as building blocks in the construction of larger schemes, the number of such “small” schemes is typically exponential in the number of the participant. Sun et al. [42] developped a scheme in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction without changing the information rate.
These results about information ratios improve limited ones in [12] which states that
there are access structures with four participants for which any secret
sharing scheme must give some participant a share that is at least
The concept of graph decomposition was extended to hypergraphs by Di
Crescenzo and Galdi [16]. A
hypergraph is a generalization of a graph in the sens that a
hyperedge can join any number of vertices, while an edge joins two
vertices of a graph. More formally, a hypergraph
Even the problem of finding optimal hypergraph decomposition can be
solved efficiently for certain special types of hypergraphs, namely
hyperpaths, hypercycles, hyperstars and acyclic hypergraphs, it is
The Table 2 compares different decomposition constructions on different types of graphs and hypergraphs with their contributions to the field.
Paper | Construction Method | Types of Graphs | Contribution |
Blundo et al. [8], (1995) | graph decomposition | connected graphs | Optimal information rate for paths and even-length cycles is 2/3. Optimal average information rate schemes are constructed for paths and even-length cycles. For any tree, schemes with information rate at least 1/2 and average information rate at least 2/3. Study of the 30 connected graphs on at most 5 vertices. |
Sun et al. [43], (2002) | Weighted decomposition construction | connected graphs on six vertices |
improve the information rates in four cases of graphs on six vertices |
Van Dijk et al. [45], (2006) |
|
connected graphs on six vertices | (6, 1)-decomposition with optimal worst-case information rate of 5/9 (4, 1)-decomposition with optimal worst-case information rate of 3/5 (7, 3)-decomposition with optimal worst-case information rate of 4/7 |
Di Crescenzo et al. [16], (2009) | Hypergraph decomposition | Hypergraphs | optimal SSS for hyperpaths and hypercycles characterization of ideal hyperstars upper and lower bounds on the information rate and average information rate for hyperpaths, hypercycles, hyperstars and acyclic hypergraphs optimal hypergraph decomposition is NP-complete for general hypergraphs |
Garahi et al. [23] (2019) |
|
connected graphs on six vertices | Exact value of optimal linear information rate of the remaining seven graphs provide a new upper bound on the optimal information rate |
Beimel [1] (2023) |
|
Hypergraphs |
the share size of two families of k-hypergraphs, |
Qi Chen et al. [14] extended this study to ideal uniform multipartite secret sharing schemes based on polymatroids, their main idea was to construct ideal linear secret sharing schemes using two different approaches, the first one uses Gabidulin codes[22] leading to schemes where the size of the shares and secret is polynomial in the number of participants, the second approach consists of using linear algebraic techniques results in efficient schemes when the number of parts is small compared to the number of participants. As an application, authors mention their own ongoing work aiming the design of practical distributed cryptographic protocols in the scenario of blockchain by these schemes. Table 3 provides a comparison between two recent approaches represented by Qi Chen et al. [14] (2024) and Csirmaz et al. [19] (2024).
Aspect | Qi Chen et al. [14] (2024) | Csirmaz et al. [19] (2024) |
Graph structure | Multipartite | Bipartite |
Paper investigation | Construction of ideal linear schemes for ideal uniform multipartite access structures. |
Exploring the use of bipartite constructions through matroid theory in |
Techniques | Polymatoids, Gabidulin codes and linear algebraic techniques | Matroids, polymatroids and submodular optimization |
Applications | threshold cryptography, secure multiparty computations, and oblivious transfer | group signatures, secure file storage, and secure multiparty computation |
Multipartite access structures motivated by [27], are a generalization of threshold secret sharing, where participants are divided into different classes, participants in the same class play an equivalent role. If the number of these classes is two, we are then talking about bipartite access structure.
Bipartite access structures divide the set of participants into two
classes, where all participants in the same class play an equivalent
role (Figure 2). Pàdro et al. [31] completely characterized ideal secret
sharing schemes realizing bipartite access structures, while the optimal
information rate of a non-ideal bipartite access structure is at most
For more than two decades, the lower bound
Beimel et al. [3]
constructed efficient linear SSS for graph access structures, which
include sparse and dense graphs. Recall that a sparse graph of
Adding or removing at most
The total share size
The maximum share size
If the scheme that realizes
To our knowledge, this is the first review that explored the intricate relationship between secret sharing schemes and graph theory, two domains that have witnessed significant advancements in recent years. The convergence of these fields has led to new approaches that not only enhance the theoretical understanding of secret sharing but also improve its practical applications. Our results identified several key developments, including the use of graph theoretic properties to optimize secret sharing schemes. These approaches have demonstrated potential in minimizing the number of shares required for secret reconstruction and enhancing the security of the sharing process. By leveraging the inherent properties of graphs, several researches have developed more efficient and robust secret sharing protocols that are resilient to various attacks. Furthermore, the synthesis of the literature highlighted the importance of interdisciplinary collaboration, as the integration of graph theory into secret sharing has opened new avenues for research and application. The review also underscored the need for continued exploration of complex graph structures and their potential to address existing challenges in secret sharing, such as scalability and dynamic participant management.
Despite the progress made, several gaps remain, particularly in the
application of advanced graph theoretic techniques to real world
scenarios. Future research should focus on bridging these gaps, with an
emphasis on developing adaptive and scalable secret sharing models that
can accommodate the ever-evolving landscape of digital communication and
data security. One promising direction lies in leveraging advanced graph
structures, such as hypergraphs, Cayley graphs, and Schreier graphs in
their relationship to
1970-2025 CP (Manitoba, Canada) unless otherwise stated.