Skip to main content
Log in

Secret sharing schemes based on the dual of Golay codes

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

Linear codes are an important class of codes in coding theory and have been extensively studied due to their significant applications (including the design of secret sharing schemes) in practical systems. Interesting linear codes having several different real-world applications are the so-called Golay codes. Secret sharing schemes play a fundamental role in cryptography and have numerous applications in security systems. One approach to constructing secret sharing schemes is based on linear codes, especially for minimal linear codes and self-dual codes. Several minimal linear codes based on Boolean cryptographic functions and vectorial Boolean functions have been found. This paper proposes two secret sharing schemes based on the dual of the [23,12,7]2 and [11,6,5]3 Golay codes, respectively, where these two Golay codes are neither minimal nor self-dual. We determine the minimal access structures of our schemes by using the two Golay codes’ combinatorial properties. To our surprise, our schemes are 3-democratic. This is interesting since our schemes are not threshold secret sharing schemes, and previous works propose some democratic secret sharing schemes that are based on the dual of minimal linear codes. On the other hand, we find that our schemes’ minimal access structures contradict a result of Dougherty et al. (ITW 2008). We then revise the minimal access structures of the secret sharing schemes based on the [24,12,8]2 and [12,6,6]3 extended Golay codes, respectively, and we further discuss the democracies of these two schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ashikhmin, A., Barg, A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44(5), 2010–2017 (1998)

    Article  MathSciNet  Google Scholar 

  2. Bartoli, D., Bonini, M.: Minimal linear codes in odd characteristic. IEEE Trans. Inf. Theory 65(7), 4152–4155 (2019)

    Article  MathSciNet  Google Scholar 

  3. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the national computer conference’79, AFIPS Proceedings, vol. 48, pp 313–317 (1979)

  4. Bouyuklieva, S., Varbanov, Z.: Some connections between self-dual codes, combinatorial designs and secret sharing schemes. Adv. Math. Commun. 5(2), 191–198 (2011)

    Article  MathSciNet  Google Scholar 

  5. Carlet, C., Ding, C., Yuan, J.: Linear codes from perfect nonlinear mappings and their secret sharing schemes. IEEE Trans. Inf. Theory 51(6), 2089–2102 (2005)

    Article  MathSciNet  Google Scholar 

  6. Chang, S., Hyun, J.Y.: Linear codes from simplicial complexes. Des. Codes Cryptogr. 86(10), 2167–2181 (2018)

    Article  MathSciNet  Google Scholar 

  7. Cohen, G.D., Mesnager, S., Patey, A. Stam, M. (ed.): On minimal and quasi-minimal linear codes, vol. 8308. Springer, Berlin (2013)

  8. Ding, C., Yuan, J. Calude, C.S., Dinneen, M. J., Vajnovszki, V. (eds.): Covering and Secret Sharing with Linear Codes, vol. 2731. Springer, Berlin (2003)

  9. Ding, C., Heng, Z., Zhou, Z.: Minimal binary linear codes. IEEE Trans. Inf. Theory 64(10), 6536–6545 (2018)

    Article  MathSciNet  Google Scholar 

  10. Ding, C., Salomaa, A.: Secret sharing schemes with nice access structures. Fundam. Inform. 72(1,2), 51–63 (2006)

    MathSciNet  MATH  Google Scholar 

  11. Dougherty, S.T., Mesnager, S., Solé, P.: Secret-sharing schemes based on self-dual codes. In: 2008 IEEE information theory workshop, pp 338–342 (2008)

  12. Golay, M.J.E.: Notes on digital coding. In: Proceedings of the IRE, vol. 37, p 637 (1949)

  13. Huffman, W.C., Pless, V.: Fundamentals of error-correcting codes. Cambridge University Press, Cambridge (2003)

    Book  Google Scholar 

  14. Ito, M., Saito, A., Nishizeki, T.: Multiple assignment scheme for sharing secret. J. Cryptol. 6(1), 15–20 (1993)

    Article  MathSciNet  Google Scholar 

  15. Li, N., Mesnager, S.: Recent results and problems on constructions of linear codes from cryptographic functions. Cryptogr. Commun. 12(5), 965–986 (2020)

    Article  MathSciNet  Google Scholar 

  16. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland Publishing company, Amsterdam (1977)

    MATH  Google Scholar 

  17. Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of 6th joint swedish russian workshop on information theory, pp. 276–279 (1993)

  18. Massey, J.L.: Some applications of coding theory in cryptography, codes and ciphers. Cryptography and Coding IV, Formara Ltd, Esses England 33–47 (1995)

  19. McEliece, R.J., Sarwate, D.V.: On sharing secrets and Reed-Solomon codes. Comm. ACM 24(9), 583–584 (1981)

    Article  MathSciNet  Google Scholar 

  20. Mesnager, S.: Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr. Commun. 9(1), 71–84 (2017)

    Article  MathSciNet  Google Scholar 

  21. Mesnager, S. In: Huffman, W.C., Kim, J.-L., Solé, P. (eds.) : Linear Codes from Functions A Concise Encyclopedia of Coding Theory Chapter 20. CRC Press/Taylor and Francis Group (Publisher), London (2021)

  22. Mesnager, S., Özbudak, F., Sınak, A.: A new class of three-weight linear codes from weakly regular plateaued functions. In: Proceedings of the Tenth International Workshop on Coding and Cryptography (WCC 2017) (2017)

  23. Mesnager, S., Özbudak, F., Sınak, A.: Linear codes from weakly regular plateaued functions and their secret sharing schemes. Des. Codes Cryptogr. 87(2-3), 463–480 (2019)

    Article  MathSciNet  Google Scholar 

  24. Mesnager, S., Sınak, A.: Several classes of minimal linear codes with few weights from weakly regular plateaued functions. IEEE Trans. Inf. Theory 66(4), 2296–2310 (2020)

    Article  MathSciNet  Google Scholar 

  25. Mesnager. S., Sınak, A., Yayla, O.: Minimal linear codes with few weights and their Secret Sharing. International Journal of Information Security Science Springer 8(3), 44–52 (2019)

    Google Scholar 

  26. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  27. Shi, M., Wu, R, Liu, Y., Solé, P.: Two and three weight codes over \(\mathbb {F}_{p}+u\mathbb {F}_{p}\). Cryptogr. Commun. 95, 637–646 (2017)

    Article  Google Scholar 

  28. Shi, Z., Fu, F.: Several families of q-ary minimal linear codes with \(w_{\min \limits }/w_{\max \limits }\leq (q-1)/q\). Discrete Math. 343(6), 111840 (2020)

    Article  MathSciNet  Google Scholar 

  29. Sınak, A.: Minimal linear codes from weakly regular plateaued balanced functions. Discret. Math. 344(3), 112215 (2021)

    Article  MathSciNet  Google Scholar 

  30. Su, S., Li, P.: Photoacoustic Signal Generation with Golay Coded Excitation. In: 2010 IEEE International Ultrasonics Symposium. pp. 2151-2154 (2010)

  31. Yuan, J., Ding, C.: Secret sharing schemes from three classes of linear codes. IEEE Trans. Inf. Theory 52(1), 206–212 (2006)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Associate Editor and the anonymous referees for their helpful comments and suggestions, which significantly improved the paper. The third author thanks the program co-chairs and the general co-chairs of the conference BFA 2020 for their kind invitation and for making the online conference very successful despite the pandemic. The authors thank Steven T. Dougherty for his interesting comments on this paper. They also address their thanks to Cunsheng Ding and Huaxiong Wang for their valuable and helpful discussions and suggestions on this paper’s initial result.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changlu Lin.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Boolean Functions and Their Applications V Guest Editors: Lilya Budaghyan, Claude Carlet, Tor Helleseth and Kaisa Nyberg

The work of Jian Ding and Changlu Lin was supported in part by National Natural Science Foundation of China (U1705264 and 61572132), Natural Science Foundation of Fujian Province (2019J01275), University natural Science Research Project Of Anhui Province (KJ2018A0584, KJ2020A0779), and Guangxi Key Laboratory of Trusted Software (KX202039).

Appendices

Appendix : A

Dougherty et al. [11] pointed that there were 253 minimal codewords having weight 16 in \(\mathcal {G}_{24}\). We will show that this statement contradicts our Lemmas 1 and 2. Assume that c(16,24) is a minimal codeword of weight 16 in \(\mathcal {G}_{24}\), and its support is denoted by

$$supp(\mathbf{c}^{(16,24)})=\{0,x_{1},\ldots,x_{15}\}\in B_{0}^{(16,24)},$$

where \(0<x_{1}<\dots <x_{14}<x_{15}\). Consequently, we get a codeword c in \(\mathcal {G}_{23}\), which is obtained by deleting the last coordinate of c(16,24).

If x15≠ 23, we have \(supp(\mathbf {c}^{(16,24)})=supp(\mathbf {c})\in B_{0}^{(16,23)}\). By Lemma 2, the codeword c is not a minimal codeword in \(\mathcal {G}_{23}\), and hence there is a \(\mathbf {c}^{(8,23)}\in \mathcal {G}_{23}\) such that supp(c(8,23)) \(\in B_{0}^{(8,23)}\) and supp(c(8,23)) ⊂ supp(c). Since \(\mathcal {G}_{23}\) is obtained by puncturing \(\mathcal {G}_{24}\), there is a codeword \(\mathbf {c}^{(8,24)}\in \mathcal {G}_{24}\) satisfying supp(c(8,24)) = supp(c(8,23)). Thus we have

$$0\in supp(\mathbf{c}^{(8,24)})=supp(\mathbf{c}^{(8,23)})\subset supp(\mathbf{c})=supp(\mathbf{c}^{(16,24)}),$$

which implies c(16,24) is not a minimal codeword in \(\mathcal {G}_{24}\) if 23∉supp(c(16,24)).

If x15 = 23, we have \(supp(\mathbf {c})\in B_{0}^{(15,23)}\) and supp(c(16,24)) = supp(c) ∪{23}. According to Lemma 1, the codeword c is not a minimal codeword in \(\mathcal {G}_{23}\), and hence there is a codeword \(\mathbf {a})\in \mathcal {G}_{23}\) such that \(supp(\mathbf {a})\in B_{0}^{(7,23)}\cup B_{0}^{(8,23)}\) and supp(a) ⊂ supp(c). Moreover, there is a codeword \(\mathbf {a}^{(8,24)}\in \mathcal {G}_{24}\) satisfying

$$supp(\mathbf{a}^{(8,24)})=supp(\textbf{a})\cup \{23\},$$

which shows that

$$0\in supp(\mathbf{a}^{(8,24)})=supp(\textbf{a})\cup \{23\}\subset supp(\mathbf{c})\cup \{23\}=supp(\mathbf{c}^{(16,24)}),$$

and hence c(16,24) is not a minimal codeword in \(\mathcal {G}_{24}\) if 23 ∈ supp(c(16,24)).

To conclude this discussion, c(16,24) is not a minimal codeword in \(\mathcal {G}_{24}\). This contradicts the assumption that c(16,24) is a minimal codeword.

Appendix : B

We will prove that any two different normalized codewords of weight 6 in \(\mathcal {G}_{11}\) have different supports. Similarly, we can prove the case for codewords of weight 5. Assume that \(\mathbf {c}_{1}^{(6,11)}\) and \( \mathbf {c}_{2}^{(6,11)}\) are two different normalized codewords of weight 6 in \(\mathcal {G}_{11}\) such that \(supp(\mathbf {c}_{1}^{(6,11)})=supp(\mathbf {c}_{2}^{(6,11)})\). Since the first coordinate of these two codewords are 1, we have

$$1\leq \text{wt}(\mathbf{c}_{1}^{(6,11)}-\mathbf{c}_{2}^{(6,11)})\leq 5.$$

From the weight enumerator of \({\mathcal {G}_{11}}\) we obtain that \(\text {wt}(\mathbf {c}_{1}^{(6,11)}-\mathbf {c}_{2}^{(6,11)}))=5\). As a result, wt(c(6,11) + c(5,11)) = 2, which is a contradiction to the weight enumerator of \({\mathcal {G}_{11}}\). This completes the proof.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ding, J., Lin, C. & Mesnager, S. Secret sharing schemes based on the dual of Golay codes. Cryptogr. Commun. 13, 1025–1041 (2021). https://doi.org/10.1007/s12095-021-00531-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-021-00531-w

Keywords

Mathematics Subject Classification (2010)

Navigation