<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>A
combinatorial approach to threshold schemes. SIAM
Journal of Discrete Mathematics</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Result Computation for University of Ibadan Statistics Department Using Anonymous Threshold Scheme</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>CCS Concepts</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>In this paper</institution>
          ,
          <addr-line>we constructed (2, 7)-anonymous threshold scheme from the (49, 56, 8, 7, 1) Resolvable Balanced Incomplete Block Design (RBIBD) using MATLAB codes. The (2</addr-line>
          ,
          <institution>7)-anonymous threshold scheme was then applied to Result Processing Scheme in the Department of Statistics, University of Ibadan. The scheme developed satisfied the security requirements of authenticity, integrity and verifiability thus making it better than the scheme currently being used in the Department</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>O. A. Otekunrin Department of Statistics University of Ibadan</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>P. A. Emehinola Department of Statistics University of Ibadan</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Secret sharing; Resolvable Balanced Incomplete Block Designs; Anonymous threshold scheme</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <volume>1</volume>
      <issue>2</issue>
      <fpage>7</fpage>
      <lpage>9</lpage>
      <abstract>
        <p>• Security and privacy ➝ Security privacy ➝ Access control</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>Keeping secrets is as old as man. In the early times, human beings
kept secrets by inscribing special writings on rocks and walls,
keeping of special articles in earthen wares and burying
underground etcetera. This has changed drastically today where
secrets are kept today using advanced forms of computer
technology. Most of our personal information are now on the
databases of government, banks, healthcare institutions and other
organisations. When these secrets are properly managed, our
lives, businesses, political activities and so on are ultimately
protected. Secure key management has been an active area of
research since the independent works of [1] and [2].</p>
    </sec>
    <sec id="sec-2">
      <title>2. SECRET SHARING SCHEMES</title>
      <p>Secret sharing is a method of dividing a secret among a set of
{ } of n participants. Each of the participants is
given a part (share) of the secret in such a way that only certain
specified (qualified) subsets of the n participants can reconstruct
the secret by combining their shares while certain set of
participants gets no information about the secret even when they
combine their shares[3].</p>
      <p>Variants of secret sharing schemes abound in literature. These
include the works of [4], [5], [6], [7], [8], [9], [10] among others.
Some applications of secret sharing schemes, which include
private proximity testing and recursive information hiding, can be
found in [11] and [12].</p>
    </sec>
    <sec id="sec-3">
      <title>2.1 Perfect -Threshold Scheme</title>
      <p>A perfect threshold scheme is defined by [13] as follows:
Suppose that t and w are integers such that . A
perfect -threshold scheme is a method of sharing a secret
value among a finite set { } of participants in
such a way that any participants can compute the value of but
no group of (or fewer) participants can compute any
information about the value of from the information they hold
collectively.</p>
    </sec>
    <sec id="sec-4">
      <title>2.2 Anonymous Threshold Schemes</title>
      <p>
        Anonymous threshold schemes were first investigated by [14]. In
an anonymous threshold scheme, the secret can be reconstructed
without knowledge of which participants hold which shares. The
computation of the secret can be carried out by giving the shares
to a black box that does not know the identities of the participants
holding those shares, [15]. According to [16], the scheme can be
used to provide access to a secure area because security is
provided without any need for a separate identification protocol.
Ideal anonymous secret sharing schemes were investigated by
[17]. In this scheme, the size of the shares given to each
participant is equal to the size of the secret. They also proved that
an ideal anonymous -threshold scheme can be realized if
and only if . The -threshold scheme was
characterized by [
        <xref ref-type="bibr" rid="ref2">18</xref>
        ] in terms of a regular difference family while
[19] constructed anonymous secret sharing schemes using
combinatorial designs.
2.2.1 Definition: [13]
A perfect (t, w)-threshold scheme is an anonymous threshold
scheme if the following two properties are satisfied:
1. the w participants receive w distinct shares,
2. the secret can be computed solely as a function of t shares,
without the knowledge of which participant holds which share.
      </p>
    </sec>
    <sec id="sec-5">
      <title>3.2 Resolvable</title>
    </sec>
    <sec id="sec-6">
      <title>Design (RBIBD)</title>
    </sec>
    <sec id="sec-7">
      <title>3. BALANCED INCOMPLETE</title>
    </sec>
    <sec id="sec-8">
      <title>DESIGNS (BIBD)</title>
    </sec>
    <sec id="sec-9">
      <title>3.1 Definition: [3]</title>
      <p>Let be positive integers such that</p>
      <p>BIBD is a pair such that:
 is a set of elements called points
 is a collection of subsets of called block
 Each block contains exactly points
 Every pair of distinct points is contained in exactly
blocks
. A</p>
    </sec>
    <sec id="sec-10">
      <title>Balanced Incomplete</title>
    </sec>
    <sec id="sec-11">
      <title>Block</title>
      <p>3.2.1 Definition: [13]
Suppose is a -BIBD. A parallel class in
is a subset of disjoint blocks from whose union is . A partition
of into parallel classes is called a resolution, and is said
to be a resolvable BIBD if has at least one resolution. In an
RBIBD, each point occurs exactly one block in each part of the
partition (or parallel class)</p>
    </sec>
    <sec id="sec-12">
      <title>4. OVERVIEW</title>
    </sec>
    <sec id="sec-13">
      <title>COMPUTATION</title>
    </sec>
    <sec id="sec-14">
      <title>STATISTICS</title>
    </sec>
    <sec id="sec-15">
      <title>UNIVERSITY OF IBADAN</title>
    </sec>
    <sec id="sec-16">
      <title>OF RESULT</title>
    </sec>
    <sec id="sec-17">
      <title>PROCESS IN</title>
    </sec>
    <sec id="sec-18">
      <title>DEPARTMENT,</title>
      <p>Result computation issues are highly sensitive matters in any
University setting. In the Department of Statistics, University of
Ibadan, result computation issues are handled through the
collaborative efforts of eight out of the total population of staff
members of the Department. They are the Head of Department
(HOD), the Examination Officer, four Undergraduate Level
Advisers and two System Analysts. The HOD is the overall
Coordinator of result computation matters in the Department. The
Level Advisers coordinate students’ registration while the
Examination Officer coordinates undergraduate students’
examinations and receives examination results from course
lecturers. The two System Analysts ensure that the students’
registration details and results are correctly stored on the system.
The program used for computing the results was developed by a
trusted computer programmer who is not a member of the
University community. The HOD, Examination Officer, the final
year level adviser and the two system analysts were all trained to
handle the program. Each of them is assumed to be trustworthy
and each has individual password that give them access to the
program. There is also a wireless intranet provision that allows
these five members to connect their personal laptops to the main
computer system and the result computation can only be done in
the office where the main computer system is located. Any of
these five members can therefore access the program and compute
results, once he/she gains access to the Office.</p>
    </sec>
    <sec id="sec-19">
      <title>5. CONSTRUCTION OF (2, W)</title>
    </sec>
    <sec id="sec-20">
      <title>ANONYMOUS THRESHOLD SCHEME FROM (v, b, r, w, 1)-RBIBD</title>
      <p>The following illustration, from [13] showed that
RBIBD can be used to construct anonymous (2, w)-threshold
schemes.</p>
      <p>Suppose that is a , then there are
parallel classes,
, in the RBIBD. The Dealer
chooses a secret value from a specified set of secrets
. This implies that there are possible secrets to
choose from. The Dealer shares the secret value among the set
of participants with the assumption that
. To share the secret K, gives some partial information,
called a share, from a specified share set , to each of the
participants. The share set has cardinality . (X, A) and its
resolution are known to all the participants.</p>
      <p>To share secret , , chooses a random block
and gives the points in to the participants, each of the
participants receiving one point.</p>
      <p>Assume that any two participants with shares and want to
obtain the secret, recall that (X, A) is a BIBD with λ = 1, then there
is a unique block such that . Thus, the two shares can
be used to find the parallel class that contains and the secret
is revealed as .</p>
      <p>The scheme is anonymous because the computation of the secret
depends on the shares and not on the identities of the
shareholders. The security of the scheme is guaranteed because
any one share cannot lead to the determination of the secret key to
the program. Also, the authenticity, integrity and verifiability
requirements for the scheme are satisfied since any two
participants must submit their shares to the machine in order to
have access to the program.
6. THE RESULT PROCESSING SCHEME
was selected from a list of RBIBDs in
[21] because of its suitability to the application area. An algorithm
with five cell executions was written in MATLAB to generate the
parallel classes for . The steps taken in the
generation of the parallel classes are illustrated with the aid of the
workflow chart in Figure 1 while the parallel classes for the
RBIBD are displayed in Table 2.</p>
      <p>Read Standard BIBD Table
Extract RBIBD Based on its Conditions</p>
      <p>Create Parallel Classes
Check for Uniqueness</p>
      <p>Send to Excel
The RBIBD has point set X = {1, 2, 3,….., 49}
The blocks are arranged into
parallel classes, denoted by , as shown in Table 1
above.</p>
      <p>Suppose a trusted Dealer chooses a secret value from a
specified set of secrets . This implies that there
are possible secrets to choose from. shares the secret value
among the set of participants with the
assumption that . The share set has cardinality .
The RBIBD and its resolution are known to the 7
participants. In sharing the secret , , chooses a
random block and gives the points in to the
participants, each of the participants receiving one point.
Assume that any 2 of the 7 participants with shares and want
to obtain the secret, recall that this RBIBD has its λ = 1, then there
is a unique block such that . Thus, the parallel class
that contains is determined and the secret is revealed as .
The (2,7)-anonymous threshold scheme described above is
applied as follows:
Assume that a seven (7) member committee, , coordinates
result-related issues for students in the Department. The
committee comprises of the Head of Department (1), the
Examination Officer (1), the Level Advisors (4) and the System
Analyst (1). Assume that a trusted dealer , a third party outside
the Department, wrote the computer program that computes
students’ results. To prevent unauthorized access to the program,
he devised a Anonymous Scheme that allows at least any
two of the seven member committee access to the program.
shares the secret key among the committee members such that
each member receives a distinct share and the identity of each
shareholder is not linked to their respective shares. To reconstruct
the secret, any two members submit their shares to the machine,
the shares are kept secret by the machine, the secret key is
obtained and access is thus provided to the two members.
For example, if wants to share the secret key among the 7
participants, picks a random block in , (say
{2 11 2 2 31 46 }). These are distributed to members of the
committee in such a way that each member is not linked to their
respective shares. Any two of the shares e.g. 2 and 2 can be used
to reveal the secret. This is because the unique block containing
2 and 2 is {2 11 2 2 31 46 } and the parallel class that
contains this block is . So, the secret is .</p>
      <p>Since any one member cannot access the program to compute the
students’ results, the scheme ensures that the security
requirements of authenticity, integrity and verifiability for the
scheme are satisfied. Thus, the scheme is preferable to the one
being used in the Department.</p>
    </sec>
    <sec id="sec-21">
      <title>7. CONCLUSION</title>
      <p>Secret sharing schemes are used for increasing the security of
important information. Different secret sharing schemes abound in
literature one of which is Anonymous threshold scheme. In this
paper, the (2,7) anonymous threshold scheme was constructed
from the (49, 56, 8, 7, 1) RBIBD. The (2, 7) anonymous threshold
scheme was then applied to Result Processing System in the
Department of Statistics, University of Ibadan. The scheme
developed satisfied the security requirements of authenticity,
integrity and verifiability since a single participant cannot have
access to the program used for computing the students’ result.
This makes the scheme better than the one currently being used in
the Department.</p>
    </sec>
    <sec id="sec-22">
      <title>8. REFERENCES</title>
      <p>[1] Shamir, A. 1979. How to share a secret. Communication
of ACM, 22 (11), 612-613.</p>
      <p>Blakley, G. R. 1979. Safeguarding cryptographic keys,
In AFIPS Conference Proceedings 48, 313- 317.</p>
      <p>Adhikari, A. 2013. Design Theory and Visual
Cryptographic Schemes. Department of Pure
Mathematics, University of Calcutta, Kolkata. Available
Online at: www.imbic.org/avishek.html.</p>
      <p>Mustafa U., Rifat, Y., Vasif V. N. and Guzin U. 2008.
(2,2)-Secret Sharing Scheme with Improved Share
Randomness. IEEE, 978-1-4244-2881-6/08, 1-5.</p>
      <p>Jun, A. and Guisheng L. 2006. A Novel Non-interactive
Verifiable Secret Sharing Scheme. In Proceedings of
Chunbo Ma, Communication Technology, ICCT’06,
International Conference (27-30 November, 2006) 1-4.
Feng, J. ,Wu, H., Tsai, C., Chang, Y.and Chu,Y. 2008.
Visual Secret Sharing For Multiple Secrets. Pattern
Recognition 41, 3572 – 3581.</p>
      <sec id="sec-22-1">
        <title>Weir J. and Yan, W. 2009. Sharing Multiple Secrets Using Visual Cryptography. IEEE 978-1-4244-38280/09, 509-512.</title>
      </sec>
      <sec id="sec-22-2">
        <title>Shao, J. and Cao, Z. 2005. A new efficient (t, n) Verifiable Multi-Secret Sharing (VMSS) based on YCH</title>
        <p>Scheme. Applied Mathematics and Computation 168
(1), 135–140.</p>
      </sec>
      <sec id="sec-22-3">
        <title>Harn, L. and Lin, C. 2010. Strong (n, t, n) verifiable</title>
        <p>secret sharing scheme. Information Sciences 180, 3059–
3064.</p>
        <p>Binu, V.P, Nair, D. G., and Sreekumar A. 2016. Secret
Sharing Homomorphism and Secure E-voting.
Available Online at: https://arxiv.org/pdf/1602.05372
Narayanan, A., Thiagarajan, N., Lakhani, M.Hamburg,
M. and Boneh, D. 2009. Optimistic Fair Exchange with
Multiple Arbiters. Brown University, Providence, RI,
USA. Available Online at:
https://eprint.iacr.org/2009/069.pdf
Katta, S. 2010. Recursive Information Hiding in Visual
Cryptography. Department of Computer Science,</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          2002.
          <article-title>On the Bound for Anonymous Secret Sharing Schemes</article-title>
          .
          <source>Discrete Applied Mathematics</source>
          <volume>121</volume>
          ,
          <fpage>193</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [18] [20]
          <string-name>
            <surname>Miao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <year>2003</year>
          .
          <article-title>A combinatorial characterization of regular anonymous perfect threshold schemes</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>Information Processing Letters</source>
          <volume>85</volume>
          ,
          <fpage>131</fpage>
          -
          <lpage>135</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Mathon</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Rosa</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2007</year>
          .
          <article-title>2-(v, k, λ) Designs of Small Order</article-title>
          . In Handbook of Combinatorial Designs,
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Colbourn</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Dinitz</surname>
          </string-name>
          , Eds., Boca Raton: CRC Press,
          <fpage>25</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>