Additive Access Structures
- Additive Access Structure is a framework that defines authorized and unauthorized participant groups using cumulative, monotone rules in secret-sharing schemes.
- It leverages additive codes, graph multigraph representations, and algebraic criteria to enable secure reconstruction in both static and dynamic models.
- The methodology integrates information-theoretic bounds and combinatorial designs to optimize secret recovery rates and ensure uniform coverage among participants.
An Additive Access Structure governs the rule set for which groups of participants are authorized or unauthorized to reconstruct a secret in secret-sharing schemes where shares are derived via additive protocols, codes, or correlated randomness. This paradigm subsumes both static, code-based schemes and dynamic, time-evolving models in which the access structure grows monotonically by authorizing new subsets at each time step. The characterization and analysis of such structures utilize algebraic constructs, graphical encodings, and information-theoretic bounds.
1. Formal Definition and Algebraic Foundations
Let denote participant indices. An Additive Access Structure (AAS) is a sequence , where (authorized sets) and (unauthorized sets) satisfy:
- (authorized sets are cumulatively enlarged),
- (unauthorized sets shrink monotonically),
- For each , and are monotone: if and , then ; similarly for (Miller et al., 14 Jan 2026).
The additive property typically stems from the underlying structure of share generation—using additive codes, correlated random variables, or combinatorial designs—where the authorized sets are tightly coupled to algebraic or graph-theoretic criteria.
2. Additive Codes and Static Access Structures
Additive codes are pivotal in static (non-evolving) AAS. For (), an additive code is a GF(2)-vector space: . Share distribution is realized via a generator matrix with nonzero columns.
The dual code is defined using the trace inner product with the trace mapping . The access structure is encoded through cosets:
- for .
- Supports define minimal authorized sets.
Critical property: Recovery of the secret requires two linearly independent trace equations from sets in distinct , rendering one-step reconstruction impossible (Kim et al., 2017).
3. Time-Evolving Additive Access Structures
In dynamic AAS models, the authorized sets are updated over discrete time steps. At each , new groups are appended to the current access structure. The dealer—knowing only the present structure—constructs secrets and public messages through random binning functions and adapts parameters quantizing the message and secrecy rates based on conditional entropies and correlated random samples (Miller et al., 14 Jan 2026).
The secret rate at step is specified by:
with reliability and secrecy requirements enforced asymptotically.
When threshold structures are used (i.e., sets of size authorized, unauthorized), the capacity simplifies to .
4. Graphical Characterization of Access Structures
Access structures can be encoded via -multigraphs ( prime), whose adjacency matrix controls authorization. For participant set and dealer vertex , the set is authorized iff there exists such that:
where . The reconstruction map for classical secrets is additive in the shares, and the access structure is fully determined by the cut-rank criterion:
5. Minimal Qualified Sets and Reconstruction
A minimal qualified group in static additive code schemes is an ordered pair with , , , such that no proper subset of or is authorized under the respective or . The total number of such minimal pairs, for example in the hexacode , is .
Reconstruction requires:
- Participants in compute .
- Participants in compute .
- The secret is recovered via the bijection (Kim et al., 2017).
6. Design-Theoretic Properties and Uniform Coverage
Support sets of codewords in extremal self-dual additive codes frequently form generalized -designs. A set of fixed weight is a generalized -design of type 3 if every subvector of weight is covered with exact multiplicity .
For extremal codes—such as the hexacode, dodecacode—the have uniform size for each and all single-point coalitions are uniformly covered. This ensures parameter regularity and uniformity in access degrees and reconstruction probabilities.
7. Probabilistic Bounds and Graph-Based Schemes
Random -multigraphs with vertices yield threshold secret-sharing schemes with the threshold parameter , where solves , with the -ary entropy (Marin et al., 2013).
The authorized subsets are precisely those whose inclusion of the dealer’s vertex increases the matrix cut-rank by one. This graphical formalism generalizes to classical and quantum secret-sharing with additive structure.
Summary Table: Mathematical Criteria for Additive Access Structures
| Model | Static/Time-Evolving | Reconstruction Rule |
|---|---|---|
| Additive Codes | Static | Two trace equations from duals , |
| Correlated AAS | Time-evolving | Typicality decoding, binning functions |
| Graph Multigraph | Static/Quantum | Cut-rank increment, linear dependency |
In both static and growing additive access structures, the authorized sets are delineated via combination of algebraic, graph-theoretic, and information-theoretic conditions, yielding precise reconstruction methodologies and capacity bounds for secret-sharing applications (Kim et al., 2017, Miller et al., 14 Jan 2026, Marin et al., 2013).