Blakley's Scheme and Alternative Constructions
Why Look at Alternatives?
Shamir's scheme is so dominant in modern cryptography that alternative constructions are rarely implemented in production. Why study them at all? Two reasons. First, the geometric intuition of Blakley's hyperplane construction is sometimes more illuminating than Shamir's algebraic one — especially for students encountering secret sharing for the first time. Second, some generalizations (CRT-based schemes, matrix-product schemes, and quantum-resistant variants) extend more naturally from one construction than the other.
This section is short by design. It gives Blakley's construction, explains the equivalence to Shamir modulo field-size overhead, and cross-references a few alternative constructions whose relevance will return in later chapters.
Definition: Blakley's Hyperplane Secret Sharing
Blakley's Hyperplane Secret Sharing
Fix a finite field and a reconstruction threshold . Let the secret be the first coordinate of a chosen point , where are drawn independently and uniformly.
To each party , Blakley assigns a hyperplane passing through (the coefficients are chosen so that no of them are linearly dependent).
- Share. Party 's share is — the equation of its hyperplane.
- Reconstruct. Any parties intersect their hyperplanes at (generic position) and read off = first coordinate.
The perfect-secrecy claim follows from the fact that fewer than hyperplanes intersect in a line, plane, or higher-dimensional affine subspace, and the remaining uniform randomness keeps the first coordinate of the chosen uniform over .
Blakley's Scheme
A -threshold secret-sharing scheme in which the secret is a coordinate of a point in , and each share is a hyperplane through that point. Any hyperplanes (in general position) intersect at the point; fewer than leave an affine subspace of unrevealed possibilities.
Theorem: Blakley and Shamir Are Information-Theoretically Equivalent
For any , the Shamir -scheme and the Blakley -scheme over the same field (with ) are information-theoretically equivalent:
- Both achieve perfect -threshold secrecy.
- Both require share entropy (matching the converse of §3.1).
- Shares of one scheme can be converted into shares of the other by a public, deterministic linear transformation.
The difference is only in the representation: Blakley's share is field elements (the hyperplane coefficients), whereas Shamir's share is field element (the polynomial evaluation). Shamir is therefore strictly more compact in representation, which is why it dominates practice.
Both schemes encode a single field-element secret into shares using independent random elements of . The underlying linear-algebraic machine is the same — Blakley uses hyperplane equations, Shamir uses polynomial evaluations, but both are representations of the same -dimensional random subspace in .
Both achieve perfect secrecy
Shamir: proved in Theorem 3.2.1. Blakley: any hyperplanes (in general position) intersect in an affine line in , which contains exactly points with different first coordinates — uniform over given the shares.
Share sizes
In Shamir, each share is a single field element (the value of ). In Blakley, each share is the equation of a hyperplane in , i.e., field elements (with one free parameter absorbed by normalization, often leaving elements). So Blakley's shares are times larger.
Linear conversion
A Blakley share can be converted into a Shamir share by a public linear projection; the inverse mapping requires auxiliary random field elements. Since both are linear codes over , the conversion preserves secrecy.
Shamir vs. Blakley: Same Security, Different Flavor
| Property | Shamir (1979) | Blakley (1979) |
|---|---|---|
| Secret structure | Polynomial , | Point , |
| Share | Hyperplane eq. in | |
| Share size | field element | field elements |
| Reconstruction | Lagrange interpolation | Linear-system solve |
| Elegance | Compact, algebraic | Geometric, pictorial |
| Production use | Dominant (MPC wallets, HSMs) | Rare, mostly pedagogical |
Other Threshold Schemes and Their Niches
Three alternative constructions appear in the literature and will be cross-referenced in later chapters:
- Asmuth–Bloom (1983) — uses the Chinese Remainder Theorem. Shares are residues modulo carefully chosen moduli. Attractive when the secret is naturally an integer (RSA keys) and when threshold signing is desired.
- McEliece–Sarwate (1981) — Reed–Solomon code interpretation of Shamir. Highlights the coding-theoretic view: any MDS code of appropriate parameters gives a secret-sharing scheme. Chapter 11 uses this view when combining Shamir with Byzantine-error-correction.
- Karnin–Greene–Hellman (1983) — linear combinations over matrix rings. Generalizes both Shamir and Blakley; provides the cleanest converse proof of the share-size lower bound.
The point is that each construction offers a different handle on the same core information-theoretic problem. Engineers pick Shamir for compact shares, Asmuth–Bloom for integer-native secrets, and McEliece–Sarwate for explicit coding-theoretic bounds.
Example: Asmuth–Bloom CRT Sharing at
Share integer secret among parties with threshold using the Asmuth–Bloom scheme with moduli . Verify that any two shares reconstruct , using the Chinese Remainder Theorem.
Compute shares
Each share is : ; ; .
Reconstruct from shares 1 and 2
By CRT, the unique with and and is . ✓
Reconstruct from shares 1 and 3
CRT: and , . Solving, . Same answer regardless of which two shares are used.
Caveat
For Asmuth–Bloom to achieve perfect secrecy, the moduli must satisfy (for and ). Our numbers happen to work because is small; a more formal deployment would choose from a pre-committed range.
Common Mistake: Hyperplanes Must Be in General Position
Mistake:
Assign each party the same hyperplane up to translation, or use linearly dependent hyperplane normals.
Correction:
If the 's are linearly dependent, shares can fail to intersect in a single point (the intersection has positive dimension), and reconstruction fails. The standard fix is to draw the 's from a Vandermonde construction — which, not coincidentally, recovers Shamir exactly. The "alternative" constructions collapse to the same algebraic backbone when you insist on worst-case correctness.
Key Takeaway
Many constructions, one information-theoretic problem. Shamir, Blakley, Asmuth–Bloom, and McEliece–Sarwate all achieve perfect -threshold secret sharing. They differ in representation and in which algebraic structure they emphasize, but they are equivalent up to a public, efficient linear transformation. For the rest of the book we use Shamir exclusively, both for its compactness and its natural connection to polynomial-based coded computing (Chapter 5).
Quick Check
Compared to Shamir's -scheme, Blakley's hyperplane scheme has:
Stronger security against computationally bounded adversaries
Larger shares (by a factor of ) but the same security guarantee.
Smaller shares, with a weaker security guarantee
A different threshold structure (e.g., general access structures)
Blakley's share is a hyperplane equation in — field elements per share versus for Shamir. Security is identical.