Blakley's Scheme and Alternative Constructions

Why Look at Alternatives?

Shamir's scheme is so dominant in modern cryptography that alternative constructions are rarely implemented in production. Why study them at all? Two reasons. First, the geometric intuition of Blakley's hyperplane construction is sometimes more illuminating than Shamir's algebraic one — especially for students encountering secret sharing for the first time. Second, some generalizations (CRT-based schemes, matrix-product schemes, and quantum-resistant variants) extend more naturally from one construction than the other.

This section is short by design. It gives Blakley's construction, explains the equivalence to Shamir modulo field-size overhead, and cross-references a few alternative constructions whose relevance will return in later chapters.

Definition:

Blakley's Hyperplane Secret Sharing

Fix a finite field Fq\mathbb{F}_q and a reconstruction threshold tt. Let the secret sFqs \in \mathbb{F}_q be the first coordinate of a chosen point p=(s,p2,,pt)Fqt\mathbf{p} = (s, p_2, \ldots, p_t) \in \mathbb{F}_q^t, where p2,,ptp_2, \ldots, p_t are drawn independently and uniformly.

To each party k{1,,n}k \in \{1, \ldots, n\}, Blakley assigns a hyperplane Hk={xFqt:akx=bk}H_k = \{\mathbf{x} \in \mathbb{F}_q^t : \mathbf{a}_k^\top \mathbf{x} = b_k\} passing through p\mathbf{p} (the coefficients ak\mathbf{a}_k are chosen so that no tt of them are linearly dependent).

  • Share. Party kk's share is (ak,bk)(\mathbf{a}_k, b_k) — the equation of its hyperplane.
  • Reconstruct. Any tt parties intersect their hyperplanes at p\mathbf{p} (generic position) and read off ss = first coordinate.

The perfect-secrecy claim follows from the fact that fewer than tt hyperplanes intersect in a line, plane, or higher-dimensional affine subspace, and the remaining uniform randomness keeps the first coordinate of the chosen p\mathbf{p} uniform over Fq\mathbb{F}_q.

Blakley's Scheme

A (t,n)(t, n)-threshold secret-sharing scheme in which the secret is a coordinate of a point in Fqt\mathbb{F}_q^t, and each share is a hyperplane through that point. Any tt hyperplanes (in general position) intersect at the point; fewer than tt leave an affine subspace of unrevealed possibilities.

Theorem: Blakley and Shamir Are Information-Theoretically Equivalent

For any tnt \leq n, the Shamir (t,n)(t, n)-scheme and the Blakley (t,n)(t, n)-scheme over the same field Fq\mathbb{F}_q (with q>nq > n) are information-theoretically equivalent:

  1. Both achieve perfect (t,n)(t, n)-threshold secrecy.
  2. Both require share entropy H(sk)=H(s)H(s_k) = H(s) (matching the converse of §3.1).
  3. Shares of one scheme can be converted into shares of the other by a public, deterministic linear transformation.

The difference is only in the representation: Blakley's share is tt field elements (the hyperplane coefficients), whereas Shamir's share is 11 field element (the polynomial evaluation). Shamir is therefore strictly more compact in representation, which is why it dominates practice.

Both schemes encode a single field-element secret into nn shares using t1t-1 independent random elements of Fq\mathbb{F}_q. The underlying linear-algebraic machine is the same — Blakley uses hyperplane equations, Shamir uses polynomial evaluations, but both are representations of the same (t1)(t-1)-dimensional random subspace in Fqt\mathbb{F}_q^t.

Shamir vs. Blakley: Same Security, Different Flavor

PropertyShamir (1979)Blakley (1979)
Secret structurePolynomial p(x)p(x), p(0)=sp(0) = sPoint pFqt\mathbf{p} \in \mathbb{F}_q^t, p1=sp_1 = s
Sharesk=p(αk)Fqs_k = p(\alpha_k) \in \mathbb{F}_qHyperplane eq. (ak,bk)(\mathbf{a}_k, b_k) in Fqt\mathbb{F}_q^t
Share size11 field elementtt field elements
ReconstructionLagrange interpolationLinear-system solve
EleganceCompact, algebraicGeometric, pictorial
Production useDominant (MPC wallets, HSMs)Rare, mostly pedagogical

Other Threshold Schemes and Their Niches

Three alternative constructions appear in the literature and will be cross-referenced in later chapters:

  • Asmuth–Bloom (1983) — uses the Chinese Remainder Theorem. Shares are residues modulo carefully chosen moduli. Attractive when the secret is naturally an integer (RSA keys) and when threshold signing is desired.
  • McEliece–Sarwate (1981) — Reed–Solomon code interpretation of Shamir. Highlights the coding-theoretic view: any MDS code of appropriate parameters gives a secret-sharing scheme. Chapter 11 uses this view when combining Shamir with Byzantine-error-correction.
  • Karnin–Greene–Hellman (1983) — linear combinations over matrix rings. Generalizes both Shamir and Blakley; provides the cleanest converse proof of the share-size lower bound.

The point is that each construction offers a different handle on the same core information-theoretic problem. Engineers pick Shamir for compact shares, Asmuth–Bloom for integer-native secrets, and McEliece–Sarwate for explicit coding-theoretic bounds.

Example: Asmuth–Bloom CRT Sharing at n=3n = 3

Share integer secret s=11s = 11 among n=3n = 3 parties with threshold t=2t = 2 using the Asmuth–Bloom scheme with moduli (m1,m2,m3)=(7,11,13)(m_1, m_2, m_3) = (7, 11, 13). Verify that any two shares reconstruct ss, using the Chinese Remainder Theorem.

Common Mistake: Hyperplanes Must Be in General Position

Mistake:

Assign each party the same hyperplane up to translation, or use linearly dependent hyperplane normals.

Correction:

If the ak\mathbf{a}_k's are linearly dependent, tt shares can fail to intersect in a single point (the intersection has positive dimension), and reconstruction fails. The standard fix is to draw the ak\mathbf{a}_k's from a Vandermonde construction — which, not coincidentally, recovers Shamir exactly. The "alternative" constructions collapse to the same algebraic backbone when you insist on worst-case correctness.

Key Takeaway

Many constructions, one information-theoretic problem. Shamir, Blakley, Asmuth–Bloom, and McEliece–Sarwate all achieve perfect (t,n)(t, n)-threshold secret sharing. They differ in representation and in which algebraic structure they emphasize, but they are equivalent up to a public, efficient linear transformation. For the rest of the book we use Shamir exclusively, both for its compactness and its natural connection to polynomial-based coded computing (Chapter 5).

Quick Check

Compared to Shamir's (t,n)(t, n)-scheme, Blakley's hyperplane scheme has:

Stronger security against computationally bounded adversaries

Larger shares (by a factor of tt) but the same security guarantee.

Smaller shares, with a weaker security guarantee

A different threshold structure (e.g., general access structures)