Next Article in Journal
Internet-of-Things Edge Computing Systems for Streaming Video Analytics: Trails Behind and the Paths Ahead
Previous Article in Journal
Challenges and Opportunities in the Internet of Intelligence of Things in Higher Education—Towards Bridging Theory and Practice
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

IoT-Applicable Generalized Frameproof Combinatorial Designs

Indian Statistical Institute, Kolkata 700108, West Bengal, India
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
IoT 2023, 4(3), 466-485; https://doi.org/10.3390/iot4030020
Submission received: 26 June 2023 / Revised: 31 July 2023 / Accepted: 15 September 2023 / Published: 21 September 2023

Abstract

:
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efficient data transfer in sensor-based IoTs is built using ramp-type schemes. Protecting personal privacy and reinforcing the security of electronic identification (eID) cards can be achieved using similar schemes. Desmedt et al. introduced the concept of frameproofness in 2021, which motivated us to further improve our construction with respect to this framework. We introduce a graph theoretic approach to the design for a well-rounded and easy presentation of the idea and clarity of our results. We also highlight the importance of secret sharing schemes for IoT applications, as they distribute the secret amongst several devices. Secret sharing schemes offer superior security in lightweight IoT compared to symmetric key encryption or AE schemes because they do not disclose the entire secret to a single device, but rather distribute it among several devices.

1. Introduction

The Internet of Things (IoT) is a rapidly growing network of interconnected devices that communicate with each other to perform various tasks. As the number of IoT devices increases, so does the need for secure communication between them. Cryptography is an essential tool for securing IoT devices, and secret sharing schemes are one of the most promising cryptographic elements for IoT. For example, the Datachest application encrypts and stores sensitive data in commercial cloud storage systems using secret sharing [1]. The application uploads the data in encrypted form, and cryptographic keys are divided into shares. Each cloud receives one share, and this solution improves the security of users’ sensitive data in the cloud. In this paper, we identify the importance of applicability of secret sharing schemes to IoT, and pay particular attention to the value our proposed distribution design may introduce through frameproofness of the underlying scheme in such applications as well as possibilities for integrating multiple or multi-level systems without complete loss of distinction of the underlying individual systems.
A secret sharing scheme is a useful tool in modern cryptography. They are distinctive in distributing a secret amongst multiple devices, ensuring that no single device has access to the entire secret. This makes secret sharing schemes ideal for IoT applications where multiple devices need to work together to perform a task. For example, in a smart home system, multiple devices such as sensors, cameras, and smart locks need to communicate with each other to provide security and convenience to the homeowner. In secret sharing-based IoT (SBIoT), each cloud server is given a share constructed using a secret sharing scheme. A collection of servers can reconstruct the secret provided that they satisfy the reconstruction criteria of the underlying scheme (instead of privately owned keys in encryption-based schemes). Such a scheme enables processing without the need of decryption. Energy efficiency refers to the total energy consumption of an IoT network, which affects the lifetime of a network [2]. It is well-known that use of a ramp-type scheme improves the security and energy efficiency in SBIoT networks [3]. It provides better security against various types of attacks, including replay attack, modification attack, selective forwarding attack, and data leakages when a passive attacker is encountered. These benefits contribute to enhancing the overall security and performance of data transfer in SBIoT networks. Using a threshold scheme enhances personal information protection for eID cards by not storing any personal information per se in the card [4]. Instead, sensitive personal information is divided into two parts for distributed storage in the client and the eID card. This ensures safety even when eID cards are lost because none of the original information can be figured out from a single secret share. With this structure, no information whatsoever on the original can be known from only the secret share in the card.
Consider b players and a positive integer τ b . Suppose a dealer distributes a secret to these b players such that any collection of τ players can reconstruct the secret with their shares, but no smaller collection of players can do so. This is called a ( τ , b ) -threshold secret sharing scheme with threshold  τ . If the dealer distributes shares to b players such that any collection of τ 1 players can reconstruct the secret but no collection of τ 2 or less players can do so (for τ 2 < τ 1 b ), then it is called a ( τ 1 , τ 2 , b ) -ramp scheme. Thus, if τ 1 τ 2 = 1 , then it is a ( τ 1 , b ) -threshold scheme. In this paper, we shall present a repairable ramp scheme, which we call a tensor design.
Secret sharing schemes also play a crucial role in ensuring secure data storage within cloud environments. These schemes involve the division of data into multiple shares, which are then stored on different servers. This approach provides a safeguard against any potential compromise of a single server, thereby maintaining the security of the data. In [5], the authors present an exploration of the comparative performance of Shamir’s secret sharing algorithm [6] and Rabin’s IDA [7] within a private cloud framework utilizing the OpenStack cloud infrastructure. The experimental results indicated that Shamir’s secret sharing algorithm outperformed Rabin’s IDA in terms of generating the shares and reconstructing the data. However, Rabin’s IDA exhibited a lower storage overhead when compared to Shamir’s secret sharing algorithm. These findings underscore the importance of considering various factors, such as generation time, reconstruction time, and storage requirements, when selecting an appropriate secret sharing scheme for secure data storage in cloud environments.
In their 2019 work, Stinson and Kacsmar [8] demonstrated non-ideal secret sharing schemes stemming from an ideal scheme (viz. Shamir scheme) as the base scheme. They presented a distribution design which was a threshold scheme with the ability to repair lost shares with a certain probability, and secure against any adversary with lesser players than the threshold. Our work further generalizes the domain over which our distribution designs are defined, in addition to providing it with easier secret reconstruction and share repairability, and securing it in more than one context. In short, we revisit the combinatorial design and some of its key properties first.

1.1. Combinatorial RTS

Consider the problem of securely reconstructing the lost share of a player by that player and a subset of the other players. A combinatorial solution to this problem was proposed by Stinson and Wei [9]. These schemes are termed combinatorial RTS. A repairable threshold scheme (RTS) is a ( τ , b ) -threshold scheme in which a subset of players can repair another player’s share in the event that their share is lost or corrupted, without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme.

1.2. A Drawback and an Idea of Extension

The combinatorial model proposed so far produces shares that are in a finite field F q k . Whether we can extend this notion to an integer ring is the first question. In this work, we propose a method to construct a distribution design with entries from an integer ring, thus generalizing the domain. We further show that this is a ramp scheme and consequently give a method of secret reconstruction for it, which is significantly easier in comparison to [8]. The size of the authorized coalition that can recover the secret is significantly reduced in our framework. Example 3 will demonstrate the fact.

Repairability Problem

Techniques from network reliability theory are heavily used in reliability studies of these combinatorial repairable threshold schemes in a setting where players may not be available to take part in the repair of a given player’s share. Reference [8] deals with the problem of reliability of such schemes and reconstruction of secrets and repairing shares without participation of the dealer.
The scheme proposed in this paper produces a far more efficient share repairability, which is possible due to the generalized domain, and based heavily on the easier secret reconstruction mentioned beforehand.

1.3. Frameproofness

Moving forward with the concept of repairing shares, another similar possibility was recently explored, called framing. Instead of simply specifying the minimum size of a set of players that can access the secret, suppose the dealer defines the share distribution through some other process. Say f : P { 0 , 1 } (where P denotes the power set of the set of all players P ) such that any coalition of players A P can access the secret if and only if f A = 1 (thus, in a Shamir scheme, f A = 1 if and only if A τ ). If A P maps to 1 through f, then A is called an authorized coalition; if it maps to 0, then A is an unauthorized coalition.
Given such an access structure over a secret sharing scheme, suppose a coalition A of players can gain information about the share of a player P P A dishonestly. Then A can wrongly accuse P of releasing information about the secret that only A is not authorized to access, i.e., A can frame P. Framing a player (or players) evidently undermines the security of any secret sharing scheme, as it allows a group of players to access extra information about the secret illegally. Thus, it is imperative to limit such capabilities and/or size of any such coalition when constructing a combinatorial RTS. The concept of frameproofness was examined by Desmedt et al. in their recent paper [10]. In this paper, we improve the extension scheme so that no framing is possible for any coalition of smaller size than the threshold. The question of what can be the minimum size of a coalition that can frame a player under this modification currently remains open.

2. Results

In this paper, we first introduce an operation, the Krönecker product of two matrices, extendable to a Krönecker product of two BIBDs. Following up with some properties of this operation, we present methods to solve two inherent problems with Krönecker products; firstly, the operation does not produce a BIBD from two BIBDs, and secondly, we resolve the issue of uniqueness that arises with the introduction of this operation. Our next theorem deals with the existence of secret reconstruction, which we prove by producing an algorithm. A probabilistic proof is given next.
An immediate consequence of our results on the new scheme is its extendability to multiple BIBDs. We discuss it briefly though a dealer’s algorithm. We proceed with an example to illustrate our algorithms further. We make considerable improvements on the method of share repair described in [8] for our proposed Krönecker product-induced BIBDs.
Next, we explore the concept of frameproofness for our proposed model and improve it significantly through certain changes in the model. We also prove existence of frameproofness of the modified scheme through results based on matchings of bipartite graphs.
Finally, we note the importance of secret sharing schemes in varied IoT applications, especially for their lightweight functionality, uniquely encapsulated through the non-accessibility of the full secret to any single entity, which we strengthen by frameproofness and can expand by incorporating multiple systems by our Krönecker product.

Organization of the Paper

Our paper starts with a brief review of the work performed by Stinson and Wei [9] in Section 3. We then move on to describe our construction, beginning with an introduction of the Krönecker product of two BIBDs in Section 4. We describe the secret reconstruction procedure for such an object illustrated through an example in Section 5. Next, we briefly describe the method of share repair and compute the corresponding repair probabilities, much like in [8], in Section 6. We then proceed to modify this scheme to give a frameproof construction in Section 7. Furthermore, we answer the question of existence of such a modified construction in Section 8. Finally, we draw the reader’s attention to the applicability of our results to secret sharing applications on the Internet of Things, especially in a secure, lightweight context, in Section 9.

3. Stinson and Wei’s Model [9]

The classical Shamir scheme is defined over a finite field F q ( q b + 1 ) . It involves the following:
  • an initialization phase, in which the dealer chooses distinct, non-zero public elements x 1 , x 2 , , x b from F q , and gives value x i to player P i ;
  • a share distribution phase in which the dealer chooses a secret K = a 0 F q , then secretly chooses a 1 , , a τ 1 F q independently and uniformly at random, and finally computes the share y i = a ( x i )   where   a ( x ) : = j = 0 τ 1 a j x j and gives it to player P i .
The combinatorial solution proposed by Stinson and Wei [9] to the share repairability problem is based on an old technique by Benaloh and Leichter, namely, giving each player a subset of shares from an underlying threshold scheme called a base scheme (which is, say, a ( σ , m ) -Shamir scheme over the base field F q ). Each player is then given a certain subset of d of the m shares, by use of a set system (or design) consisting of b blocks of size d, defined on a set of m points. This design is termed the distribution design:
y 11 y 12 y 1 d y 21 y 22 y 2 d y b 1 y b 2 y b d , { y i j } i { 1 , 2 , , b } j { 1 , 2 , , d } m .
The resulting expanded ( τ , b ) -threshold scheme consists of each player P i corresponding to a block B i B of the distribution design. For each point x B i , the player P i is given the subshare s x . If X denotes the set of m points on which the design is defined and B = { B 1 , , B b } is the set of all blocks, then this forms an ( X , B ) -distribution design.
Definition 1. 
Suppose 2 k < v . A ( b , v , k , r , λ ) -balanced incomplete block design or a ( b , v , k , r , λ ) -BIBD is a design ( X , B ) such that:
1. 
| X | = v ;
2. 
each block B B contains exactly k points;
3. 
every pair of distinct points from X is contained in exactly λ blocks.
Observe that if each point occurs in exactly r blocks, then the parameters b , v , k , r , λ of a BIBD satisfy the following relations [11]:
(i) 
b k = v r ;
(ii) 
λ ( v 1 ) = r ( k 1 ) ;
(iii) 
b v (and hence r > k ).
Definition 2. 
We shall call a distribution design a tensor design if it simply satisfies property (i) above.

Design Properties

Next, we consider an example to demonstrate the fact that the object constructed in Section 4 is in fact a ramp scheme. For the purpose of computations, we recall some results from [8] on block designs.
Theorem 1 
(Replication Number). Every point in a ( v , k , λ ) -BIBD occurs in exactly r = λ ( v 1 ) k 1 blocks. The value r is termed the replication number of the scheme.
Theorem 2 
(Blocks and Block Size). A ( v , k , λ ) -BIBD has exactly
b = v r k = λ ( v 2 v ) k 2 k blocks of size k.

4. Tensor Design Generated by Two BIBDs

Given two matrices A and B , the usual matrix product operation can be carried out only when the column size of the left matrix A is equal to the row size of the right matrix B . The Krönecker product can be applied on any two matrices, irrespective of their dimension. This operation has several applications in Linear Algebra, of which, we consider some properties that shall be useful for working with BIBDs.

4.1. Definition of the Krönecker Product

The Krönecker product of two matrices A b 1 × k 1 and B b 2 × k 2 is the block matrix
A B = a 11 B a 12 B a 1 k 1 B a 21 B a 22 B a 2 k 1 B a b 1 1 B a b 1 2 B a b 1 k 1 B ,
where a i j denotes the entry in the i th row and j th column of A .
Observe that Krönecker products follow the associative property. Thus, for matrices A , B , and C ,
A B C = A B C .
Another interesting property of Krönecker products is that they maintain structure over block matrices. Thus, if A is written as a block matrix
A 11 A 12 A 1 k A 21 A 22 A 2 k A b 1 A b 2 A b k   for   some   b b 1   and   k k 1 ,
then   A B = A 11 B A 12 B A 1 k B A 21 B A 22 B A 2 k B A b 1 B A b 2 B A b k B .

4.2. Krönecker Product of Two BIBDs

Let A and B be the share matrices generated by ramp schemes with, respectively, b 1 and b 2 blocks having shares of sizes k 1 and k 2 . Suppose A and B also denote the b 1 × k 1 and b 2 × k 2 matrices corresponding to the two schemes. The Krönecker product of A B is therefore
M = a 11 B a 12 B a 1 k 1 B a 21 B a 22 B a 2 k 1 B a b 1 1 B a b 1 2 B a b 1 k 1 B = T 1 T 2 T b 1 ,
where T i ( i { 1 , 2 , , b 1 } ) is the i th row-block submatrix of M containing rows ( i 1 ) b 2 + 1 , ( i 1 ) b 2 + 2 , , i b 2 . If the share matrix A is defined over the field F p 1 and B over the field F p 2 for some primes p 1 and p 2 , then we define the scalar multiplication by simple integer multiplication:
F p 1 × F p 2 Z such   that   ( x 1 , x 2 ) x 1 · x 2 .
The reason behind taking such a multiplication is that the product elements are not distinguishable from integers. Therefore, M is a matrix over the integer ring Z .
At this point, the first observation that we make is that the Krönecker product A B of two BIBDs A and B does not always produce a BIBD. To illustrate the fact, we start with a small example, and then we describe a method for resolving this issue. Also, the Krönecker product in general does not produce an injective mapping from M b 1 × k 1 × M b 2 × k 2 to the matrix space M b 1 b 2 × k 1 k 2 . So it is hopeless to search for a secret reconstruction procedure from a given Krönecker product matrix. We shall thus impose a condition producing an injective map and in turn, ensuring the existence of secret reconstruction.
Consider an example of two 2 ( 4 , 3 , 2 ) Shamir schemes in F 5 and F 7 over the points { 1 , 2 , 3 , 4 } and { 1 , 2 , 3 , 5 } constructed using two polynomials modulo F 5 and F 7 , respectively. These can be represented by share matrices A and B , respectively, with r 1 = r 2 = 3 :
A = 1 2 3 2 1 4 3 4 2 4 3 1 and B = 1 2 3 2 3 5 3 5 1 5 1 2 .
The Krönecker product of the BIBDs A and B is as follows:
123246369
23546106915
35161029153
51210241536
2461234812
461023581220
610235112204
10245122048
3694812246
6915812204610
9153122046102
153620481024
4812369123
812206915235
122049153351
20481536512
Hence, A B has the parameters b = 16 ,   v = 12 , and k = 9 ; the parameters r and λ are not well-defined. Obviously, neither does this satisfy property 3 of a BIBD (Definition 1), nor the relation (i) of a tensor design (Definition 2). Lemmas 1–3 and Theorem 3 ensure that we always obtain a tensor design from a Krönecker product, and furthermore that we always obtain a secret reconstruction for such a share distribution scheme.

4.3. Some Results on the Krönecker Product of BIBDs

We now resolve these issues by defining some properties of a tensor design. Let A and B be share matrices defined on points { x 1 , x 2 , , x n } and { y 1 , y 2 , , y m } , respectively. Let B d be the same distribution scheme as B , but on the points { y 1 + d , y 2 + d , , y m + d } . The position of an element in the Krönecker product of these two matrices can be found by simple counting, and is stated in the following lemma:
Lemma 1. 
The product of a i j A and b k l B can be found in the row ( i 1 ) b 2 + k (which is also the player number in the repair scheme represented by M), and the column ( j 1 ) k 2 + l of M.
The next result helps ensure that A B is indeed a BIBD:
Lemma 2. 
Let { x 1 , x 2 , , x n } and { y 1 , y 2 , , y m } be two collections of integers. Then there exists an integer d such that { x 1 , x 2 , , x n } and { y 1 + d , y 2 + d , , y m + d } have no multiplicative collisions of the type x i y j = x k y l for ( i , j ) ( k , l ) .
Proof. 
Set d max i , k { 1 , 2 , , n } j , l { 1 , 2 , , m } { x i y j x k y l } + 1 . Suppose x i ( y j + d ) = x k ( y l + d ) .
x i y j + x i d = x k y l + x k d ( x k x i ) d = x i y j x k y l d = x i y j x k y l x k x i ;
however, since d max i , k { 1 , 2 , , n } j , l { 1 , 2 , , m } { x i y j x k y l } + 1 , this is a contradiction. Therefore, { x 1 , x 2 , , x n } and { y 1 + d , y 2 + d , , y m + d } produce no multiplicative collisions. □
Lemma 3. 
Given a list of distinct elements { y 1 , y 2 , , y m } , we can choose an integer d ^ such that gcd ( y 1 + d ^ , y 2 + d ^ , , y m + d ^ ) = 1 .
Proof. 
Without loss of generality, we may assume y 1 < y 2 < < y m . Let l = gcd ( y 1 , y 2 , , y m ) and fix i < j in { 1 , 2 , , m } . Thus, y i = l k i and y j = l k j such that k i < k j . Choose d ^ such that gcd ( d ^ , l ) = 1 and gcd ( d ^ + y i , k j k i ) = 1 for some j in { 1 , 2 , , m } . Now, gcd ( y i + d ^ , y j + d ^ ) = gcd ( l k i + d ^ , l k j + d ^ ) = gcd ( l k i + d ^ , l ( k j k i ) ) = 1 . □
Theorem 3 
(Reconstruction from Tensor Designs). Consider a ( v 1 , k 1 , λ 1 , b 1 , r 1 ) -BIBD A and a ( v 2 , k 2 , λ 2 , b 2 , r 2 ) -BIBD B .
1. 
The matrix A B d produces a tensor design (over the integer ring Z ) for a (public) integer d such that there are no multiplicative collisions of the type x i ( y j + d ) = x k ( y l + d ) for ( i , j ) ( k , l ) .
2. 
  • If gcd ( x 1 , x 2 , , x v 1 ) = 1 ;
  • if gcd ( y 1 , y 2 , , y v 2 ) = 1 ;
then A and B can be reproduced from a collection of players in the new scheme A B d , hence enabling share repair and secret reconstruction.
This theorem can be generalized for finitely many such Krönecker products, and motivates us to present the following algorithm for a share distribution scheme.
Proof. 
The parameters of the Krönecker product A B are b = b 1 b 2 , v = v 1 v 2 , k = k 1 k 2 , r = r + 1 r + 2 , λ = λ 1 λ 2 . Part 1 of the theorem therefore follows from Lemma 2, which ensures a well-defined value for r, and Lemma 3, which ensures a well-defined value for λ .
In order to prove part 2, we describe two ways to reproduce A and B . Recall first that any τ 1 rows of A produce all points of A , and similarly τ 2 rows for B d . Furthermore, we claim the following:
[I] 
A collection of players that has
(i)
τ 2 players from one row-block T i of M;
(ii)
at least one player from distinct τ 1 1 row-blocks T j T i of the remaining b 1 1 row-blocks
can reconstruct the secret.
[II] 
Let S j ( j { 1 , 2 , , b 2 } ) be the collection of players { P b 2 k + j : k { 0 , 1 , , b 1 1 } } . A collection of players that contains
(i)
τ 1 players from one S j ;
(ii)
at least one player from τ 2 1 S i , i j
can also reconstruct the secret.
We now present an algorithm to prove claim [I]; claim [II] follows similarly.
  • The share of the j th player P i · b 2 1 + j of the i th row-block T i is of the form
    a i 1 · { b j 1 , b j 2 , , b j k 2 } , a i 2 · { b j 1 , b j 2 , , b j k 2 } , , a i k 1 · { b j 1 , b j 2 , , b j k 2 } .
    Fix any i { 1 , 2 , , b 1 } and choose j 1 , j 2 , , j τ 2 to ensure that
    gcd ( b j 1 1 , b j 1 2 , , b j 1 k 2 , b j 2 1 , b j 2 2 , , b j 2 k 2 , , b j τ 2 1 , b j τ 2 2 , , b j τ 2 k 2 ) = 1 .
  • Therefore, the values of a i 1 , a i 2 , , a i k 1 become known. Divide a i α b j k β by a i α (for α { 1 , 2 , , k 1 } , β { 1 , 2 , , k 2 } and k { 1 , 2 , , τ 2 } ) to obtain b j k 1 , b j k 2 , , b j k k 2 .
  • Construct the complete matrix B d using the shares of τ 2 players of B d that are now known. Hence construct B .
  • Using the values of the elements in B d , compute the values a i 1 , a i 2 , , a i k 1 for τ 1 1 indices i that are distinct from each other as well as from i.
  • Hence, construct A from the shares of τ 1 players of A thus obtained.
  • Finally compute the secret from A and B .
This reconstruction algorithm is clearly better than the one in [8] in the sense that the size of the authorized coalition is smaller. In fact, the size of the authorized coalition, while not unique, has a lower bound in the number of players. The following section provides a proof that there is always a secret reconstruction for this scheme.

4.4. Proof of Existence of Secret Reconstruction

Let us redefine the problem in terms of random variables. Let X 1 , X 2 , , X n be sampled without replacement from the collection of all players. We assume a uniform probability distribution over the set of all players.
Let I i , j = 1 if   X i S j , i [ n ] , j [ b 2 ] , 0 otherwise . Also let J i , k = 1 if   X i T k , i [ n ] , k [ b 1 ] , 0 otherwise .
We further define n k = i = 1 n J i , k and r j = i = 1 n I i , j . Then the condition for reconstruction becomes
[I] 
 
(i)
max k [ b 1 ] n k τ 2 ,
(ii)
n k 1 for at least τ 1 indices k.
[II] 
 
(i)
max j [ b 2 ] r j τ 1 ,
(ii)
r j 1 for at least τ 2 indices j.
Let E 1 be the event that condition [I] is satisfied and E 2 be the event that condition [II] is satisfied. Also, let D ( n 0 ) be the event that n n 0 . We find an n 0 such that Pr E 1 E 2 | n n 0 1 . This is equivalent to Pr E 1 c E 2 c | n n 0 0 . In fact, it is sufficient to show Pr E 1 c | n n 0 0 and Pr E 2 c | n n 0 0 .
As E 1 = E 1 ( i ) E 1 ( i i ) , E 1 c = E 1 ( i ) c E 1 ( i i ) c ,
Pr E 1 c | n n 0 = Pr E 1 ( i ) c E 1 ( i i ) c | n n 0                                                 = Pr E 1 ( i ) c | n n 0 + Pr E 1 ( i i ) c | n n 0 Pr E 1 ( i ) c E 1 ( i i ) c | n n 0
Lemma 4. 
Pr E 1 ( i ) c E 1 ( i i ) c | n ( τ 1 1 ) ( τ 2 1 ) + 1 = 0 .
Proof. 
We observe that E 1 ( i ) c is the event max k [ b 1 ] n k < τ 2 and E 1 ( i i ) c is the event that n k 1 for at most τ 1 1 indices k. Thus, if there are ( τ 1 1 ) ( τ 2 1 ) + 1 players in a collection, then by the pigeonhole principle, either E 1 ( i ) c or E 1 ( i i ) c is violated. □
Lemma 5. 
Pr E 1 ( i ) c | n τ 2 1 b 1 + 1 = 0 .
Proof. 
We observe that E 1 ( i ) c is the event max k [ b 1 ] n k < τ 2 and there are b 1 n k s. Thus, if there are ( τ 2 1 ) b 1 + 1 players in a collection, then by the pigeonhole principle, E 1 ( i ) c is violated, since there is at least one n k with τ 2 or more players. □
Lemma 6. 
Pr E 1 ( i i ) c | n τ 1 1 b 2 + 1 = 0 .
Proof. 
We observe that E 1 ( i i ) c is the event that n k 1 for at most τ 1 1 indices k. By definition, each n k can have at most b 2 elements. Thus, any collection of ( τ 1 1 ) b 2 + 1 players violates E 1 ( i i ) c . □
Lemma 7. 
Pr E 2 ( i ) c E 2 ( i i ) c | n ( τ 1 1 ) ( τ 2 1 ) + 1 = 0 .
Proof. 
We observe that E 2 ( i ) c is the event max j [ b 2 ] r j < τ 1 and E 2 ( i i ) c is the event that r j 1 for at most τ 2 1 indices j. Thus, if there are ( τ 1 1 ) ( τ 2 1 ) + 1 players in a collection, then by the pigeonhole principle, either E 2 ( i ) c or E 2 ( i i ) c is violated. □
Lemma 8. 
Pr E 2 ( i ) c | n τ 1 1 b 2 + 1 = 0 .
Proof. 
We observe that E 2 ( i ) c is the event max j [ b 2 ] r j < τ 1 and there are b 2 r j s. Thus, if there are ( τ 1 1 ) b 2 + 1 players in a collection, then by the pigeonhole principle, E 2 ( i ) c is violated, since there is at least one r j with τ 1 or more players. □
Lemma 9. 
Pr E 2 ( i i ) c | n τ 2 1 b 1 + 1 = 0 .
Proof. 
We observe that E 2 ( i i ) c is the event that r j 1 for at most τ 2 1 indices j. By definition, each r j can have at most b 1 elements. Thus, any collection of ( τ 2 1 ) b 1 + 1 players violates E 2 ( i i ) c . □
For n 0 = max { τ 2 1 b 1 + 1 , τ 1 1 b 2 + 1 } , Lemmas 4–6 imply Pr E 1 c | n n 0 = 0 and n 0 = max { τ 2 1 b 1 + 1 , τ 1 1 b 2 + 1 } , and Lemmas 7–9 imply Pr E 2 c | n n 0 = 0 .
Note that the bound given here for the reconstruction number is tight, as we might expect. In the example presented in Section 5, the bound turns out to be 5, which matches all the bounds above. Corresponding counterexamples can be constructed to show that no smaller-sized general collection can complete the reconstruction. This result can be generalized for three or more designs. These results provide us with the tools to present a generalized scheme, which we do now.

4.5. A Generalized Share Distribution Scheme

  • Dealer selects n (not necessarily distinct) BIBDs A 1 , A 2 , , A n , where for i { 1 , 2 , , n } , A i is defined over points { x 1 i , x 2 i , , x v i i } .
  • Dealer finds an integer d 1 such that gcd ( x 1 1 + d 1 , x 2 1 + d 1 , , x v 1 1 + d 1 ) = 1 .
  • For i { 2 , , n } :
    • Dealer finds an integer d i (using Lemmas 2 and 3) such that d i breaks all pairwise multiplicative collisions and makes the gcd of all elements x l j + d j ( j { 1 , , i 1 } , l { 1 , , v j } ) and x 1 i + d i , x 2 i + d i , , x v i i + d i is 1.
  • M A 1 A 2 A n .
  • Dealer distributes each row i of M as share to player P i and outputs ( d 1 , d 2 , , d n ) publicly.
Note that by Theorem 3, M is a tensor design, and the algorithm in the proof of the theorem can be generalized for secret reconstruction of this scheme.

5. Example

Recall the previous example (5). Using the algorithm in Section 4.5, we produce a tensor design A B 21 using an integer d = 21 satisfying Lemma 3. Representing the share matrix modified from B by B 21 (and noting that both share matrices are undeclared), with r 1 = r 2 = 3 :
B 21 = 22 23 24 23 24 26 24 26 22 26 22 23 ,
we still have b 1 = 4 , b 2 = 4 , k 1 = 3 , and k 2 = 3 . Observe that τ 1 = 2 and τ 2 = 2 are the reconstruction numbers of A and B , respectively. The Krönecker product of the two matrices A and B 21 , represented by the matrix M, is shown in Figure 1.

5.1. Secret Reconstruction

The matrix A B 21 in the above example produces interesting results.
  • A collection of three players—exactly two from one of the sets T 1 , T 2 . T 3 , T 4 and one from another—allows reconstruction of the secret. For example, consider the set of three players { P 1 , P 2 , P 5 } . This set can reconstruct the secret:
    (i)
    gcd ( 22 , 23 , 24 , 23 , 24 , 26 ) = 1 ; hence, the first row of M A is ( 1 2 3 ) and the first two rows of M B are ( 22 23 24 ) and ( 23 24 26 ) . As τ 2 = 2 , M B can be obtained from its two rows.
    (ii)
    Now, observing 5 = 4 · 1 + 1 , we readily know P 5 uses the first row of M B and the second row of M A ; this yields the second row of M A , ( 2 1 4 ) . Since τ 1 = 2 and we have two rows of M A , the whole matrix M A is known.
  • Any collection of three players—two from one of the sets S 1 , S 2 , S 3 , S 4 and one from another—also allows reconstruction of the secret.
  • Reconstruction of the secret is ensured for a collection of five or more players.
This idea can be generalized to a secret reconstruction algorithm in the general case.

6. Share Repair for a Krönecker Product-Induced Distribution Design

Let A and B be ( v 1 , k 1 , 1 ) - and ( v 2 , k 2 , 1 ) -BIBDs with b 1 and b 2 blocks, and replication numbers r 1 and r 2 , respectively. Consider player P 1 , whose share is the first block (i.e., row) of A B . Thus,
share   of   P 1 = a 11 b 11 a 11 b 12 a 11 b 1 k 2 | a 12 b 11 a 12 b 12 a 12 b 1 k 2 |                                                                                                                   | a 1 k 1 b 11 a 1 k 1 b 12 a 1 k 1 b 1 k 2 = L 1 | L 2 | | L k 1 .
Using the notations and method described in [8] (and making the same assumption that any player is available with a fixed probability p), the probability of availability of at least one repair set is
R ( p ) = 1 1 p r 1 r 2 k 1 k 2 .
We   improve   this   method   significantly .   For   this ,   observe   that   each   block   L k ( k { 1 , 2 , ,   k 1 } ) ( possibly   with   a   different   factor   a m i   for some   m { 1 , 2 , ,   b 1 } , i { 1 , 2 , ,   k 1 } ,   from   A )   occurs   in   the   shares   of   r 1 1   players   other   than   P 1 .
Furthermore, the share of P 1 can also be characterized as
a 11 b 11 a 11 b 12 a 11 b 1 k 2 | a 12 b 11 a 12 b 1 k 2 | | a 1 k 1 b 11 a 1 k 1 b 1 k 2 ;
K 1 : = a 11 b 11 a 12 b 11 a 1 k 1 b 11 , K 2 : = a 11 b 12 a 12 b 12 a 1 k 1 b 12 , K k 2 : = a 11 b 1 k 2 a 12 b 1 k 2 a 1 k 1 b 1 k 2 .
It   is   thus   clear   that   each   K j ( j { 1 , 2 , , k 2 } )   ( possibly   with   a   different                   factor   b l j   for   some   l { 1 , 2 , , b 2 } ,   from   B )   occurs   in   the   shares   of   r 2 1     players   other   than   P 1 .
Let us assume that we have t 1 players of type (9) and t 2 players of type (10). Then
R ( t 1 , t 2 ) * ( p ) = R t 1 * ( p ) R t 2 * ( p ) R δ * ( p ) ,
where
(i)
t 1 are selected from type (9);
(ii)
t 2 are selected from type (10);
(iii)
δ k 1 k 2 t 1 k 1 t 2 ( k 2 t 1 ) are selected independently, and
R t 1 * ( p ) = 1 ( 1 p ) r 1 1 t 1 R t 2 * ( p ) = 1 ( 1 p ) r 2 1 t 2 R δ * ( p ) = 1 ( 1 p ) ( r 1 1 ) ( r 2 1 ) δ .
Observe that δ = ( k 1 t 2 ) ( k 2 t 1 ) . Therefore, the probability of at least one repair set being available in this case is
R * ( p ) = t 1 , t 2 R t 1 * ( p ) R t 2 * ( p ) R δ * ( p ) .
Let E * ( p ) be the expected number of minimal repair sets. In general, this expected number is the product of the total number of possible repair sets and the probability of availability of each repair set. Ref. [8] sets E ( p ) = ( r 1 r 2 ) k 1 k 2 . We denote by C ( t 1 , t 2 ) , the number of partitions of a set of size k 1 k 2 into three sets of sizes t 1 , t 2 and k 1 k 2 t 1 t 2 . By an argument similar to the previous,
E t 1 * ( p ) = ( r 1 1 ) t 1 p t 1 , E t 2 * ( p ) = ( r 2 1 ) t 2 p t 2 ,   and E δ * ( p ) = ( r 1 1 ) ( r 2 1 ) δ p δ ,   so   that E ( t 1 , t 2 ) * ( p ) = C ( t 1 , t 2 ) E t 1 * ( p ) E t 2 * ( p ) E δ * ( p ) . Hence ,   E * ( p ) = t 1 , t 2 C ( t 1 , t 2 ) E t 1 * ( p ) E t 2 * ( p ) E δ * ( p ) .
Table 1 shows a comparison of share repair probability on three projective plains for two different methods.

7. Frameproofness

Consider matrix representations of two BIBDs A = a i j i { 1 , , b 1 } j { 1 , , k 1 } and B = b i j i { 1 , , b 2 } j { 1 , , k 2 } , and their Krönecker product as depicted in Equation (4). We show here how the share of a player, say P 1 , can be retrieved (i.e., player P 1 can be framed; see [10] for more details) by only two other players. For clarity, we mention here that the share of P 1 is
a 11 b 11 , a 11 b 12 , , a 12 b 11 , a 12 b 12 , , a 13 b 11 , .
  • There exist ( b 2 1 ) + ( r 1 1 ) · b 2 players that possess the element a 11 b i j for some i { 1 , 2 , , b 2 } and j { 1 , 2 , , k 2 } , since r 1 is the replication number of A . Of these, ( r 1 1 ) · 1 players possess the first k 2 elements of the share, i.e., a 11 b 11 a 11 b 12 a 11 b 1 k 2 . If any of these players know the ratios a 12 a 11 , a 13 a 11 , , then they could construct the entire share of P 1 .
  • Note that for j 1 , any of the b 2 1 players with shares
    a 11 B 2 | a 12 B 2 | | a 1 k 1 B 2 , a 11 B 3 | a 12 B 3 | | a 1 k 1 B 3 , a 11 B b 2 | a 12 B b 2 | | a 1 k 1 B b 2
    know these ratios.
Therefore, only two players—one from the r 1 1 players possessing a 11 b 11 and one from the b 2 1 players possessing a 12 a 11 , a 13 a 11 , —can reconstruct the entire share of player P 1 , and hence, frame this player.
We try to address this problem by reducing the repetitive nature of shares of the participants. We shall do this by decreasing the size of each share, while retaining all the information that a player had in the previous construction (i.e., Equation (4)).

7.1. A Modified Scheme

Given two matrices A and B of the same dimension r × c , we define the operation A B as the r × c matrix generated by position-wise products of elements of A and B , i.e., if A = a 11 a 12 a 1 c a r 1 a r 2 a r c and B = b 11 b 12 b 1 c b r 1 b r 2 b r c , then
A B = a 11 b 11 a 12 b 12 a 1 c b 1 c a r 1 b r 1 a r 2 b r 2 a r c b r c .
The operator ⊙ is well-behaved in the sense that it is commutative and respects scalar multiplication on integer-valued matrices.
Let π : { 1 , 2 , , b } { 1 , 2 , , b } be a permutation. Given i { 1 , 2 , , b } and π ( i ) = j , we define π ˜ : { 1 , 2 , , b } { 1 , 2 , , k } as π ˜ ( i ) = j ( mod k ) , for any integer k b . Now given BIBDs A b 1 × k 1 and B b 2 × k 2 , we modify their Krönecker product by first choosing a permutation π 1 randomly from the set of all permutations over { 1 , 2 , , b 2 } and producing π ˜ 1 . Then we produce π ˜ 2 , π ˜ 3 , , π ˜ k 1 by simple translations.
Next, we represent application of the function π ˜ l to the m th block matrix (of size b 2 × k 2 ) of block-row t in A B by θ m t = l , and define matrix N b 1 b 2 × k 1 k 2 = ( n i j ) divided into blocks of size b 2 × k 2 similarly as A B such that
n i j = 1 if   π ˜ l ( i ) = j n i j = 0 if   otherwise ,
where n i j is the element in the i th row and j th column of the ( m , t ) th block matrix of M. Finally, the i th row of matrix A B N produces the share of player P i ( i { 1 , 2 , , b 1 b 2 } ) by omitting the zeroes.

7.2. Example

Consider another example, where a 2 ( 4 , 3 , 2 ) -BIBD and a 2 ( 5 , 4 , 3 ) -BIBD over the points { 1 , 2 , 3 , 4 } and { 22 , 23 , 24 , 25 , 26 } are represented by matrices A and B , respectively (note that r 1 = 3 , r 2 = 4 ):
A = 1 2 3 2 3 4 3 4 1 4 1 2 , and M B = 22 23 24 25 23 24 25 26 24 25 26 22 25 26 22 23 26 22 23 24 .
Then b 1 = 4 , b 2 = 5 , k 1 = 3 and k 2 = 4 ; τ 1 = 2 and τ 2 = 2 are the reconstruction numbers of A and B , respectively.
Modifying the matrix in Figure 2, as shown in Figure 3 and Figure 4, we obtain a scheme for which it is no longer possible to reconstruct the secret of the scheme in Figure 4 from just two players (as was possible in the example in Section 5). In fact, the proceeding section provides an algorithm for secret reconstruction from this scheme using τ 1 + τ 2 players.

7.3. Secret Reconstruction for the Modified Scheme

  • Choose a player P i m (which is the i th player in the m th row-block of A B , or the ( m 1 ) b 2 + i th player from the top), for any m { 1 , 2 , , b 1 } and i { 1 , 2 , , b 2 } .
  • Consider elements a m t b i j in the share of player P i m , i.e., θ m t = l and π ˜ l ( i ) = j . For such an element a m t b i j , set y = b i j (note that the value y { y 1 , y 2 , , y v 2 } is not known, but the positions at which the matrix B contains elements b i ^ j ^ = y is known).
  • Construct set S y l ^ : π ˜ l ^ ( i ^ ) = j ^ b i ^ j ^ = y . By Theorem 6, for a maximal set S y (if not, then another value y may be chosen by selecting a different element a m t b i j ) the set
    { a m ^ t ^ : a m ^ t ^ b i ^ j ^ the   share   of   player P i ^ m ^ such   that   b i ^ j ^ = y } = { x 1 , x 2 , , x v 1 }
    is the set of all values in A .
  • Construct matrix A , since the positions of all values x 1 , x 2 , , x v 1 in this matrix are now known.
  • Compute b i j for a m t b i j ∈ share of player P i m using the known values a m t until all values y 1 , y 2 , , y v 2 are known.
  • Construct matrix B , since the positions of all values y 1 , y 2 , , y v 2 in this matrix are now known.
  • Compute A B from the two known matrices.
Thus, framing any player is not possible for just two other participants, and requires a much larger coalition.

8. Graphical Representation and Proof of Existence of Permutations

Matching in Bipartite Graphs

Given an undirected graph G , a matching of G is a subgraph M containing all vertices of G such that each vertex in M has either 0 or 1 edge incident to it. M is a maximal matching of G if it is not a subgraph of any other matching of G . Thus, adding even one more edge to a maximal matching M ensures that it is no longer a matching. The number of edges in a maximal matching of G is called the matching number of G .
A perfect matching  M of G is such that each vertex of M has an edge incident to it. Furthermore, a vertex cover of a graph G is a subgraph containing all edges of G such that every edge is incident to at least one vertex in the subgraph, and an edge cover of a graph G is a subgraph containing all vertices of G such that every vertex has at least one edge incident to it. Thus, if G has no isolated vertices, then the sum of the number of vertices in its minimal vertex cover and the number of edges in its minimal edge cover equals the total number of its vertices.
If the vertex set V of a graph G can be partitioned into two disjoint subsets as V = A B such that any edge from a vertex in A can only be incident to a vertex in B and vice versa, then G is called a bipartite graph. Let us recall some interesting results on matching in bipartite graphs.
Theorem 4 
(König, [12]). In any bipartite graph, the number of edges in a maximum matching equals the number of vertices in a minimum vertex cover.
Theorem 5 
(Hall, [13]). Given a bipartite graph G = V , E with V = A B , G has a matching of size | A | if and only if for every S A we have | N ( S ) | | S | , where N ( S ) = { b B : a S w i t h ( a , b ) E } .
Figure 5 shows a bipartite graph for the tensor design.
Definition 3. 
A bipartite graph G = V , E is said to induce a tensor design B if
  • the vertex set V = P V the disjoint union of the set of players P = { P 1 , , P b } and the set of points V = { x 1 , , x v } of B ;
  • the edge set is the collection i [ b ] j [ v ] { ( P i , x j ) : x j s h a r e   o f   P i } .
Theorem 6. 
Given a bipartite graph G inducing a tensor design B , and given subsets δ ( P i ) N ( P i ) of size s,
(i) 
If i [ b ] δ ( P i ) = V , then reconstruction of the modified scheme ( A B ) modified is possible.
(ii) 
If s 1 , then (i) holds.
Proof. 
Assuming the usual notations for a tensor design, it is clear that in G ,
| N ( x j ) | = r x j V | N ( P i 1 P i 2 ) | = λ
From Equation (13) and the inclusion-exclusion principle,
| N ( { x i 1 , , x i m } ) | m ( r λ )
Since r λ , Hall’s theorem (Theorem 5) implies G has a matching of size v, i.e., i [ b ] δ ( P i ) = V . Thus, (i) holds by the reconstruction algorithm in Section 7.3. Now choose δ ( P i ) such that each subset contains at least one point matched with P i in this matching, so that (ii) holds. This proves the theorem. □

9. Secret Sharing Schemes and the Internet of Things

Secret sharing schemes can be used to distribute the security key amongst numerous devices in an IoT system, ensuring that no single device has access to the entire key. They are also lightweight and require less computational power compared to other cryptographic elements. Additionally, their ability to detect and prevent attacks that attempt to modify or delete parts of the secret is particularly important in IoT applications where security is critical.
For example, in a healthcare IoT system, the security of patient data is of utmost importance. Secret sharing schemes can be used to distribute the patient data amongst multiple devices, ensuring that no single device has access to the entire data. Ref. [14] proposes an AI heuristic decision algorithm, utilizing a best-first search (BFS) approach. It effectively balances energy load and reduces communication overhead in smart healthcare technologies. The utilization of homomorphic secret sharing in IoT-based e-health applications provides various advantages in terms of privacy and security. It securely distributes secret pairs among medical nodes, ensuring the confidentiality of sensitive health data during transmission and storage within the network. This is achieved by encrypting data through homomorphic secret sharing, thereby preventing unauthorized access to medical data. Access to medical records is limited to authorized entities possessing the necessary secret keys to decrypt and utilize the shared data. Thus, the incorporation of homomorphic secret sharing adds an extra layer of protection against unauthorized modifications or alterations to medical records. A generalization of this scheme to multiple levels—possibly to combine data between different hospitals or chains of healthcare providers, different states within a country, or even different countries—can be easily achieved through the Krönecker product of the individual schemes used by each hospital system. The fields on which these schemes are based provide a perfect foundation for the homomorphism, which can be easily maintained by the integer ring over which the Krönecker product is then defined.
A frameproof tensor product of multiple distribution designs can be distinctly useful for lightweight IoT applications, as it allows for a multi-level or multi-system secret sharing scheme IoT implementation in a secure and efficient manner, while detecting and preventing any attempt to modify or delete parts of the secret data. This approach ensures that even if some levels are compromised, the overall security of the system(s) remains intact.
The wide range of applicability of our generalizations can be further seen in, say, the management of massive data, such as [15], which proposes a non-interactive approach for IoT data aggregation that utilizes additive secret sharing, addressing numerous challenges including privacy concerns, security risks, high communication overhead, and user interaction. The additive secret sharing effectively masks the original data, preventing malicious analysis by the servers. The scheme also supports offline mobile users, maintains privacy, and provides efficient algorithms for result verification. However, ref. [15] only splits the secret between two servers at a time. A frameproof tensor product can be smoothly applied in this context for connecting a large number of such systems, due to the underlying fields over which the secrets are split between servers in individual systems, as well as the generalized integer ring over which the tensor product is then defined.
Figure 6 shows an application of tensor design in multi-system IoT.

10. Conclusions and Future Work

In this paper, we have first generalized the concept of combinatorial RTS and then improved our secret sharing scheme by producing a frameproof one. We believe our results can be extended further to an arbitrary number of distribution designs. We also believe that the Krönecker product of BIBDs can be generalized to t-designs, and all corresponding results will hold for these. Furthermore, a frameproof modification for the generalized scheme also remains an open problem.
Furthermore, we have discussed the extensive scope of applicability for our proposed scheme in a diverse array of IoT contexts. A fascinating avenue for further investigation entails the examination of specific instances of these applications.

Author Contributions

Author B.K.R. was instrumental in providing the conceptualization of the problem. Author A.R. primarily focused on the methodology, technical details, and formal analysis. B.K.R. supplied the necessary resources for the research. A.R. contributed to the preparation of the original draft. B.K.R. played a crucial role in the review and editing of the manuscript. The supervision was conducted by B.K.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

We acknowledge Suprita Talnikar for her efforts in providing valuable insights and offering suggestions for improving the write-up. We would also like to thank the anonymous reviewers for their comments and suggestions.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
RTSRepairable Threshold Scheme
BIBDBalanced Incomplete Block Design
IoTInternet of Things
GDPRGeneral Data Protection Regulation
SBIoTSecret sharing-Based IoT
eIDelectronic IDentification
IDAInformation Dispersal Algorithm
BFSBest-First Search

References

  1. Čuřík, P.; Ploszek, R.; Zajac, P. Practical Use of Secret Sharing for Enhancing Privacy in Clouds. Electronics 2022, 11, 2758. [Google Scholar] [CrossRef]
  2. Shivhare, A.; Maurya, M.K.; Sarif, J.; Kumar, M. A Secret Sharing-Based Scheme for Secure and Energy Efficient Data Transfer in Sensor-Based IoT. J. Supercomput. 2022, 78, 15. [Google Scholar] [CrossRef]
  3. Tang, Z. Secret sharing-based IoT text data outsourcing: A secure and efficient scheme. IEEE Access 2021, 9, 76908–76920. [Google Scholar] [CrossRef]
  4. Park, N.; Lee, D. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Pers. Ubiquitous Comput. 2018, 22, 3–10. [Google Scholar] [CrossRef]
  5. Nirmala, S.J.; Bhanu, S.M.S.; Patel, A.A. A comparative study of the secret sharing algorithms for secure data in the cloud. Int. J. Cloud Comput. Serv. Archit. (IJCCSA) 2012, 2, 63–71. [Google Scholar] [CrossRef]
  6. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  7. Rabin, M.O. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM (JACM) 1989, 36, 335–348. [Google Scholar] [CrossRef]
  8. Kacsmar, B.; Stinson, D.R. A network reliability approach to the analysis of combinatorial repairable threshold schemes. Adv. Math. Commun. 2019, 3, 601–612. [Google Scholar] [CrossRef]
  9. Stinson, D.R.; Wei, R. Combinatorial repairability for threshold schemes. Des. Codes Cryptogr. 2018, 86, 195–210. [Google Scholar] [CrossRef]
  10. Desmedt, Y.; Mo, S.; Slinko, A.M. Framing in Secret Sharing. IEEE Trans. Inf. Forensics Secur. 2021, 16, 2836–2842. [Google Scholar] [CrossRef]
  11. Stinson, D.R. Combinatorial Designs: Constructions and Analysis; Circulant Combinatorics Hadamard Textbook Williamson; Springer: New York, NY, USA, 2004; ISBN 0387217371, 9780387217376, 128018938X, 9781280189388. [Google Scholar] [CrossRef]
  12. König, D. Gráfok és mátrixok. Mat. ÉS Fiz. Lapok 1931, 38, 116–119. [Google Scholar]
  13. Hall, P. On Representatives of Subsets. J. London Math. Soc. 1935, 10, 26–30. [Google Scholar] [CrossRef]
  14. Rehman, A.; Saba, T.; Haseeb, K.; Larabi Marie-Sainte, S.; Lloret, J. Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing. Energies 2021, 14, 6414. [Google Scholar] [CrossRef]
  15. Fu, Y.; Ren, Y.; Feng, G.; Zhang, X.; Qin, C. Non-Interactive and Secure Data Aggregation Scheme for Internet of Things. Electronics 2021, 10, 2464. [Google Scholar] [CrossRef]
Figure 1. The matrix A B 21 is the Krönecker product of A and B 21 as in Equation (7), and is a secret sharing scheme with reconstruction number 2. A secret reconstruction algorithm for this scheme is detailed in Section 5.1.
Figure 1. The matrix A B 21 is the Krönecker product of A and B 21 as in Equation (7), and is a secret sharing scheme with reconstruction number 2. A secret reconstruction algorithm for this scheme is detailed in Section 5.1.
Iot 04 00020 g001
Figure 2. The matrix A B is the Krönecker product of A and B as in Equation (12), and is a secret sharing scheme with reconstruction number 2.
Figure 2. The matrix A B is the Krönecker product of A and B as in Equation (12), and is a secret sharing scheme with reconstruction number 2.
Iot 04 00020 g002
Figure 3. The matrix N, right-operated as N on the tensor design A B in Figure 2.
Figure 3. The matrix N, right-operated as N on the tensor design A B in Figure 2.
Iot 04 00020 g003
Figure 4. The matrix on the left is A B N , and the one on the right is the share distribution scheme obtained from this operation, as described in Section 7.1.
Figure 4. The matrix on the left is A B N , and the one on the right is the share distribution scheme obtained from this operation, as described in Section 7.1.
Iot 04 00020 g004
Figure 5. A bipartite graph for the tensor design B defined in Sect. with 5 players and 5 points. Each edge ( P i , x j ) denotes the inclusion of point x j in the share of player P i . The collection of red edges shows one possible maximal matching for the graph.
Figure 5. A bipartite graph for the tensor design B defined in Sect. with 5 players and 5 points. Each edge ( P i , x j ) denotes the inclusion of point x j in the share of player P i . The collection of red edges shows one possible maximal matching for the graph.
Iot 04 00020 g005
Figure 6. An application of the tensor product of repairable threshold schemes in multi-system IoT, where each system (say, a single hospital) may possess a separate RTS for sharing its own secret key, while multiple systems (say, a chain of hospitals) may share their individual secrets to non-colluding cloud storage providers through a tensor product of the individual schemes.
Figure 6. An application of the tensor product of repairable threshold schemes in multi-system IoT, where each system (say, a single hospital) may possess a separate RTS for sharing its own secret key, while multiple systems (say, a chain of hospitals) may share their individual secrets to non-colluding cloud storage providers through a tensor product of the individual schemes.
Iot 04 00020 g006
Table 1. A comparison table showing probability of share repairability on three projective planes.
Table 1. A comparison table showing probability of share repairability on three projective planes.
A B R ( p ) R * ( p )
( 3 , 2 , 1 ) ( 3 , 2 , 1 ) ( 1 q 3 ) 4 > ( 1 q ) 4 +
( 3 , 2 , 1 ) ( 7 , 3 , 1 ) ( 1 q 5 ) 6 > ( 1 q 2 ) 6 +
( 7 , 3 , 1 ) ( 7 , 3 , 1 ) ( 1 q 8 ) 9 > ( 1 q 4 ) 9 +
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Roy, B.K.; Roy, A. IoT-Applicable Generalized Frameproof Combinatorial Designs. IoT 2023, 4, 466-485. https://doi.org/10.3390/iot4030020

AMA Style

Roy BK, Roy A. IoT-Applicable Generalized Frameproof Combinatorial Designs. IoT. 2023; 4(3):466-485. https://doi.org/10.3390/iot4030020

Chicago/Turabian Style

Roy, Bimal Kumar, and Anandarup Roy. 2023. "IoT-Applicable Generalized Frameproof Combinatorial Designs" IoT 4, no. 3: 466-485. https://doi.org/10.3390/iot4030020

Article Metrics

Back to TopTop