Additive Secret Sharing Schemes are cryptographic primitives that partition a secret into multiple shares such that only the sum reveals the secret, ensuring perfect secrecy.
They enable efficient secure multiparty computation via local arithmetic operations and constant-round protocols, supporting both classical and quantum network applications.
Code-theoretic and combinatorial extensions offer fine-grained access control, benefiting privacy-preserving applications like secure cloud computing and machine learning.
Additive Secret Sharing Schemes (ASS) partition a secret x from an algebraic domain (field or ring) into multiple shares x1​,…,xn​ such that only the sum (or modular sum) of all shares yields x, and no subset of n−1 or fewer shares provides information about x in the information-theoretic sense. This approach underpins secure multiparty computation and numerous cryptographic protocols, due to its homomorphic properties and composable security guarantees. ASS is realized across classical settings, with generalizations to quantum network architectures and code-theoretic structures for controlling access, correctness, and efficiency.
1. Algebraic Foundation and Construction
ASS can be instantiated over arbitrary rings or fields. For x∈F, the share-generation protocol selects n−1 independent, uniformly random values x1​,…,xn−1​∈F, then computes xn​=x−∑j=1n−1​xj​ (addition modulo the group operation in F). Each party Pj​ receives xj​, ensuring ∑j=1n​xj​=x and that any strict subset is uniformly distributed and completely hides x (Xia et al., 2020, Xiong et al., 2020):
$\text{Share}(x):\quad x_1,\dots,x_{n-1} \xleftarrow{\$} \mathbb{F},\quad x_n = x - \Bigl( \sum_{j=1}^{n-1} x_j \Bigr)</p><p>\text{Rec}(x_1,\ldots,x_n) := \sum_{j=1}^{n} x_j</p><p>Correctnessisimmediate,andperfectsecrecyagainstanycoalitionofsize< nisguaranteedbytheuniformmaskingproperty.</p><p>ExtensionsofASSleveragethestructureofadditivecodesoverfinitefieldssuchasGF(4),enablingnon−thresholdaccessstructuresandadvancedcombinatorialcontroloverauthorizedsets(<ahref="/papers/1701.04183"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Kimetal.,2017</a>).Inthissetting,thecodewordgenerationassociatesthesecretwithalinearequationoverGF(4)solvedbyarandomvectoru,andsharesaredeterminedbyageneratormatrixG.</p><h2class=′paper−heading′id=′computation−on−secret−shares′>2.ComputationonSecretShares</h2><p>ASSsharessupportarichsuiteofarithmeticoperationswithminimalinteraction.Additionandsubtractionarepurelylocalduetothelinearityofthesharing:</p><ul><li><strong>Localaddition/subtraction:</strong>Eachpartycomputesz_j = x_j + y_jtoobtainashareofz = x + y.</li><li><strong>Securemultiplication:</strong>Requirespre−processingwithBeavertriples.Atrustedthirdpartygeneratesrandoma, b, c = a b,sharesthem,andpartiescomputelocalmasksandexchangemaskeddifferences.OneroundofinteractionwithO(1)communicationsuffices(<ahref="/papers/2009.06893"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiaetal.,2020</a>,<ahref="/papers/2009.05356"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiongetal.,2020</a>):</li></ul><p>(a + e)(b + f) = ab + af + be + ef</p><p>Protocolsgeneralizetomatrixandvectoroperationsentry−wiseandallowefficient<ahref="https://www.emergentmind.com/topics/additive−parallel−correction"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">parallel</a>composition(<ahref="/papers/2009.06893"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiaetal.,2020</a>).</p><p>Fornonlinearfunctions(exponentiation,logarithm,division,comparison),switchingbetweenASSand<ahref="https://www.emergentmind.com/topics/multiplicative−secret−sharing−mss"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">MultiplicativeSecretSharing</a>(MSS)viasecureresharingenablesconstant−roundprotocols.TrigonometricandinversetrigonometricfunctionsexploitpolynomialidentitiesandTaylorexpansion,implementedviacompositionsofthebasicconstant−roundprimitives(<ahref="/papers/2009.05356"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiongetal.,2020</a>).</p><h2class=′paper−heading′id=′security−composability−and−model′>3.Security,Composability,andModel</h2><p>ASSachievesinformation−theoretic(UC−)securityagainstsemi−honestadversaries,bothintheclassicalandquantumsettings.Thesimulationargumentshowsthattheviewofanyadversarialpartycanbeperfectlysimulatedbyanindependentuniformdraw,revealingnoinformationaboutthesecret(<ahref="/papers/2009.05356"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiongetal.,2020</a>,<ahref="/papers/2009.06893"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiaetal.,2020</a>).IntheAbstractCryptographyframework,theidealfunctionality\mathrm{F_{ADD}}receivesthesecret,distributesrandomizedshares,andabortsuponadversarialinstruction.Securityproofsforquantumprotocolsintegratesecurityreductionstocomposable<ahref="https://www.emergentmind.com/topics/satellite−based−quantum−key−distribution−qkd"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">QKD</a>and<ahref="https://www.emergentmind.com/topics/hg−tnet−hybrid"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">hybrid</a>arguments(<ahref="/papers/2504.19702"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Griloetal.,28Apr2025</a>).</p><p>Composablesecurityiscrucial:composedexecutionsinclassicalorquantumnetworksaggregatedistinguishingadvantagesadditively.ForquantumQline−basednetworks,protocolstolerateabortconditionsandachieve\varepsilon−securitywith\varepsilon = (H-1)\cdot \varepsilon_{QKD'} + 2^{-\eta},whereHisthenumberofhonestpartiesand\etathehashlength(<ahref="/papers/2504.19702"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Griloetal.,28Apr2025</a>).</p><h2class=′paper−heading′id=′access−structures−and−code−theoretic−extensions′>4.AccessStructuresandCode−TheoreticExtensions</h2><p>ClassicalASSimplementsthresholdaccessstructures:anynsharessuffice,but< nareuseless.Code−basedadditiveschemesonGF(4)realizericheraccessstructures,controlledbycombinatorialdesignsinthedualadditivecode.Reconstructionrequirestwostepsusingtraceinnerproductswithvectorsfromthreedistinguisheddual−codefamiliesH_1, H_2, H_3,mappingtolookupvaluesthatuniquelydeterminethesecret(<ahref="/papers/1701.04183"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Kimetal.,2017</a>):</p><ul><li><strong>Support−basedaccess:</strong>CoalitionsauthorizedonlyiftheypossesssharescorrespondingtocodewordscoveringdistinctblocksinH_iandH_j.</li><li><strong>Cheaterdetection:</strong>Minimumcodeweightddetectsuptod-1cheatingparticipants.</li><li><strong>Minimalauthorizedsets:</strong>Definedbypairsofsupportsfromdifferentcode−designfamilies—yieldingnon−thresholdbuthighlystructuredauthorization.</li></ul><p>Self−dualcodes(e.g.,hexacode,dodecacode,S_{18})yieldgeneralizedt−designs,controllingcoalitionsizesandintersectionproperties.</p><h2class=′paper−heading′id=′quantum−assisted−distribution−and−advanced−protocols′>5.Quantum−AssistedDistributionandAdvancedProtocols</h2><p>Quantumnetworkarchitectures,notablytheQlinemodel,supportefficientASSdistributionatscale.InsteadofrequiringO(n^2)QKDlinks,theQlineallowsdistributionviaO(n)quantumlinks,usingchainedphaserotationsandbasismeasurements,withclassicalsifting,errorcorrection,andprivacyamplificationsteps(<ahref="/papers/2504.19702"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Griloetal.,28Apr2025</a>):</p><ul><li><strong>Prepare−and−measureprotocol:</strong>SinglesourceemitsBB84−typequbitssequentiallythroughJ-2intermediatephase−rotationnodes,terminatinginadetectornode.Theprotocolamalgamatesrandomsubsetbroadcasts,errorestimation,syndromeannouncement,correctnesshashes,andprivacyamplification.</li><li><strong>Multipartycryptographicprimitives:</strong>Secureanonymousveto(DiningCryptographers)andsymmetrickeyestablishmentarerealizedascompositionsofindependentASSdistributionsofzero.</li><li><strong>Performance:</strong>ForJ=4partiesandK \approx 1.7Mbitsharesize,\sim 10^7quantummeasurementsyieldsecurityadvantage10^{-11}inunder5minutes.</li></ul><p>NetworkandcommunicationcostsaresignificantlylowercomparedtoclassicalQKD−basedASS.</p><h2class=′paper−heading′id=′efficiency−communication−complexity−and−practical−impact′>6.Efficiency,CommunicationComplexity,andPracticalImpact</h2><p>ASSprotocolsofferconstantorsmallroundcomplexityforallbasicandmostadvancedfunctions(<ahref="/papers/2009.06893"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiaetal.,2020</a>,<ahref="/papers/2009.05356"title=""rel="nofollow"data−turbo="false"class="assistant−link"x−datax−tooltip.raw="">Xiongetal.,2020</a>):</p><divclass=′overflow−x−automax−w−fullmy−4′><tableclass=′tableborder−collapsew−full′style=′table−layout:fixed′><thead><tr><th>Protocol</th><th>Rounds</th><th>Communicationperparty</th></tr></thead><tbody><tr><td>Securemultiplication</td><td>1</td><td>4\ell</td></tr><tr><td>Matrixmultiplication</td><td>1</td><td>2(mk+kn)\ell</td></tr><tr><td>Securedivision</td><td>3</td><td>6\ell</td></tr><tr><td>Trigonometricops</td><td>1</td><td>4\ell</td></tr></tbody></table></div><p>Preprocessing(e.g.,Beavertriplegeneration)canbehighlyefficientandbatched,withratesabove5 \times 10^5$ triples/sec in practical experiments.
A plausible implication is that ASS with optimized secure computation protocols and quantum-assisted distribution is suitable for high-throughput privacy-preserving machine learning, cloud computing, and multi-party cryptography, delivering drastically reduced latency and communication overheads compared to classical bit-decomposition or homomorphic encryption-based approaches.
7. Comparative Analysis and Applications
ASS differs from Shamir’s threshold secret sharing in reconstruction (unconditional sum versus polynomial interpolation) and supports wider access patterns via additive codes (Kim et al., 2017). Anonymous veto, secure key establishment, privacy-preserving cloud computation (image retrieval, secure neural inference), and efficient MPC all leverage the additive linearity and constant-round computation model (Xia et al., 2020, Xiong et al., 2020, Grilo et al., 28 Apr 2025).
Security is predicated on the semi-honest assumption in classical models and on composable QKD security and quantum hardware integrity in quantum distribution regimes. Code-theoretic extensions provide granular coalition controls, and quantum distribution architectures reduce infrastructure costs and simplify scaling.
In summary, ASS constitutes a foundational cryptographic primitive, supporting scalable and efficient secure computation and secret sharing, with ongoing expansions into quantum networks and combinatorial code-theoretic architectures.