Recognition: unknown
How to reconstruct (anonymously) a secret cellular automaton
Pith reviewed 2026-05-10 15:48 UTC · model grok-4.3
The pith
Redefining the secret space as the MOLS family enables (2,n) cellular automaton threshold schemes to reconstruct secret rules anonymously.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Redefining the secret space as the family of mutually orthogonal Latin squares in existing (2,n) threshold schemes based on cellular automata enables the anonymous reconstruction of the secret CA rules while preserving the threshold property.
What carries the argument
The MOLS family, repurposed as the secret space within the cellular automaton threshold scheme to carry both the threshold access structure and the anonymity guarantee.
If this is right
- The scheme supports sharing and recovering multiple secret CA rules from the same set of shares.
- Reconstruction stays fully anonymous because it operates only on the collected shares.
- Larger MOLS families increase the number of possible secret rules but raise recovery-phase complexity.
- The original (2,n) threshold property remains intact under the redefinition.
Where Pith is reading between the lines
- Small-n implementations could be run to measure the exact computational scaling of recovery in practice.
- The same redefinition tactic might be tried on other combinatorial objects used in secret sharing to add anonymity.
- The resulting schemes could suit protocols that require hidden participant identities during secret recovery.
Load-bearing premise
The existing MOLS characterization of (2,n) CA threshold schemes can be directly repurposed by setting the secret space to the MOLS family while preserving both the threshold property and the anonymity guarantee without additional constraints.
What would settle it
A concrete counterexample where setting the secret to the MOLS family either breaks the (2,n) threshold (requiring a different number of shares) or forces the recovery step to use participant identities.
Figures
read the original abstract
We consider threshold secret sharing schemes based on cellular automata (CA) that allows for anonymous reconstruction, meaning that the secret can be recovered only as a function of the shares, without knowing the participants' identities. To this end, we revisit the basic characterization of $(2,n)$ threshold schemes based on CA in terms of Mutually Orthogonal Latin Squares (MOLS), and redefine the secret space as the MOLS family itself, showing that the new resulting scheme enables anonymous reconstruction of secret CA rules. Finally, we discuss the trade-off between the number of secret CA that can be shared and the computational complexity of the recovery phase.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper revisits the MOLS-based characterization of (2,n) threshold secret sharing schemes for cellular automata (CA). It redefines the secret space to consist of the MOLS family itself rather than a fixed CA rule, and claims that the resulting scheme permits anonymous reconstruction of the secret CA rule (i.e., recovery depends only on the collection of shares and not on participant identities). The manuscript concludes with a discussion of the trade-off between the number of shareable secret CA rules and the computational cost of the recovery phase.
Significance. If the construction and its security properties are rigorously established, the work would supply a concrete mechanism for anonymous reconstruction within the existing MOLS framework for CA threshold schemes. This could be relevant to privacy-preserving distributed protocols that employ cellular automata, and the trade-off analysis might inform parameter selection in such systems.
major comments (2)
- [Construction and proof of the new scheme] The central claim—that redefining the secret space as the MOLS family automatically yields a (2,n) threshold scheme with anonymous reconstruction—requires an explicit new sharing map and reconstruction algorithm together with a proof that any two shares recover the chosen MOLS (hence the CA rule) while a single share reveals nothing. The original MOLS characterization applies to a fixed secret CA rule; the manuscript must demonstrate that the threshold and anonymity invariants survive the redefinition without extra constraints on the MOLS family or neighborhood size.
- [Anonymity argument] Anonymity is defined as reconstruction operating solely on the unordered collection of share values with no dependence on participant labels. The paper must verify that the reconstruction procedure satisfies this property for the new secret space; the abstract and trade-off discussion do not substitute for this verification.
minor comments (2)
- [Abstract] The abstract states that the new scheme 'enables anonymous reconstruction' but supplies no illustrative example or high-level outline of the sharing/reconstruction maps; adding one would improve readability.
- [Trade-off section] The trade-off discussion between the number of secret CA rules and recovery complexity would benefit from concrete bounds or a small numerical example relating MOLS order to reconstruction time.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed comments. We agree that the manuscript requires more explicit treatment of the sharing map, reconstruction algorithm, and formal proofs to fully establish the claims. We address each major comment below and will revise the paper accordingly.
read point-by-point responses
-
Referee: [Construction and proof of the new scheme] The central claim—that redefining the secret space as the MOLS family automatically yields a (2,n) threshold scheme with anonymous reconstruction—requires an explicit new sharing map and reconstruction algorithm together with a proof that any two shares recover the chosen MOLS (hence the CA rule) while a single share reveals nothing. The original MOLS characterization applies to a fixed secret CA rule; the manuscript must demonstrate that the threshold and anonymity invariants survive the redefinition without extra constraints on the MOLS family or neighborhood size.
Authors: We agree that an explicit sharing map, reconstruction algorithm, and supporting proofs are necessary for rigor. In the revised manuscript we will define a concrete sharing map in which the secret is a family of MOLS and each participant is assigned a share consisting of a symbol-position pair drawn from the squares such that any two shares determine a unique completing MOLS via the orthogonality condition. The reconstruction algorithm will be stated as a procedure that, given any two shares, solves for the unique orthogonal mate(s) and thereby recovers the entire family (hence the CA rule). We will prove the (2,n) threshold property by showing that a single share is consistent with multiple possible MOLS families while two shares fix the family uniquely, and that these properties follow directly from the standard definition of MOLS without additional constraints on the family or on neighborhood size. The neighborhood size enters only in the subsequent CA evolution step and does not affect the combinatorial recovery of the MOLS itself. revision: yes
-
Referee: [Anonymity argument] Anonymity is defined as reconstruction operating solely on the unordered collection of share values with no dependence on participant labels. The paper must verify that the reconstruction procedure satisfies this property for the new secret space; the abstract and trade-off discussion do not substitute for this verification.
Authors: We will add an explicit verification of anonymity in the revised version. The reconstruction algorithm will be formulated to accept only the unordered multiset of share values (with no participant identifiers or ordering). Because recovery proceeds by solving the system of orthogonality equations on the received symbols alone, the output MOLS family is independent of any labeling of the participants. We will include a short lemma proving that if two different labelings produce the same multiset of shares, the recovered secret is identical, thereby confirming that anonymity holds for the redefined secret space. revision: yes
Circularity Check
Redefinition of secret space as MOLS family builds on revisited characterization without circular reduction
full rationale
The paper revisits the existing MOLS-based characterization of (2,n) CA threshold schemes and redefines the secret space as the MOLS family itself to enable anonymous reconstruction of secret CA rules. This is presented as a constructive extension rather than a derivation that reduces to its inputs by construction. No self-definitional steps, fitted parameters renamed as predictions, or load-bearing self-citations that render the central claim equivalent to prior unverified inputs appear in the abstract or described approach. The trade-off discussion on number of secrets versus recovery complexity is separate from any circularity. The result is self-contained against the base characterization, with only minor self-citation on the revisited MOLS setup that is not load-bearing for the new scheme.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption The basic characterization of (2,n) threshold schemes based on CA in terms of MOLS holds and can be adapted by redefining the secret space.
Forward citations
Cited by 1 Pith paper
-
HAGE: Harnessing Agentic Memory via RL-Driven Weighted Graph Evolution
HAGE proposes a trainable weighted graph memory framework with LLM intent classification, dynamic edge modulation, and RL optimization that improves long-horizon reasoning accuracy in agentic LLMs over static baselines.
Reference graph
Works this paper leans on
-
[1]
Bishop, M
A. Bishop, M. Green, Y . Ishai, A. Jain, and P. Lou. Fully anonymous secret sharing. In Y . T. Kalai and S. F. Kamara, editors,Advances in Cryptology - CRYPTO 2025, Proceedings, Part IV, LNCS, pages 356–389. Springer, 2025
2025
-
[2]
G. R. Blakley. Safeguarding cryptographic keys. In1979 International Workshop on Managing Requirements Knowledge, MARK 1979, pages 313–
1979
-
[3]
Blundo and D
C. Blundo and D. R. Stinson. Anonymous secret sharing schemes.Discret. Appl. Math., 77(1):13–28, 1997
1997
-
[4]
R. Con. Anonymous shamir’s secret-sharing via reed-solomon codes against permutations, insertions, and deletions.IEEE Trans. Inf. Theory, 71(12):9534– 9547, 2025
2025
-
[5]
Á. M. del Rey, J. P. Mateus, and G. R. Sánchez. A secret sharing scheme based on cellular automata.Appl. Math. Comput., 170(2):1356–1364, 2005
2005
-
[6]
Eldridge, G
H. Eldridge, G. Beck, M. Green, N. Heninger, and A. Jain. Abuse-resistant location tracking: Balancing privacy and safety in the offline finding ecosys- tem. In D. Balzarotti and W. Xu, editors,33rd USENIX Security Symposium, USENIX Security 2024. USENIX Association, 2024
2024
-
[7]
Eloranta
K. Eloranta. Partially permutive cellular automata.Nonlinearity, 6(6):1009– 1023, 1993
1993
-
[8]
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In C. Cachin and J. Camenisch, editors,Advances in Cryptology - EUROCRYPT 2004, Proceedings, Lecture Notes in Computer Science, pages 1–19. Springer, 2004. 12
2004
-
[9]
C. F. Gauß.Disquisitiones arithmeticae. Humboldt-Universität zu Berlin, 1801
-
[10]
Goldreich, S
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or A completeness theorem for protocols with honest majority. In A. V . Aho, editor,Proceedings of STOC 1987, pages 218–229. ACM, 1987
1987
-
[11]
Herranz and G
J. Herranz and G. Sáez. (k, n)-consecutive access structures.Des. Codes Cryptogr., 93(9):3543–3563, 2025
2025
-
[12]
A. D. Keedwell and J. Dénes.Latin squares and their applications. Elsevier, 2015
2015
-
[13]
Leporati and L
A. Leporati and L. Mariot. Cryptographic properties of bipermutive cellular automata rules.J. Cell. Autom., 9(5-6):437–475, 2014
2014
-
[14]
Manzoni, L
L. Manzoni, L. Mariot, and G. Menara. Combinatorial designs and cellular automata: A survey.Discret. Appl. Math., 379:656–674, 2026
2026
-
[15]
Mariot, M
L. Mariot, M. Gadouleau, E. Formenti, and A. Leporati. Mutually orthogonal latin squares based on cellular automata.Des. Codes Cryptogr., 88(2):391–411, 2020
2020
-
[16]
Mariot and A
L. Mariot and A. Leporati. Sharing secrets by computing preimages of biper- mutive cellular automata. In J. Was, G. C. Sirakoulis, and S. Bandini, editors, Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014. Proceedings, volume 8751 ofLecture Notes in Computer Science, pages 417–426. Springer, 2014
2014
-
[17]
Mariot and A
L. Mariot and A. Leporati. A cryptographic and coding-theoretic perspective on the global rules of cellular automata.Nat. Comput., 17:487–498, 2018
2018
-
[18]
Mariot, A
L. Mariot, A. Leporati, A. Dennunzio, and E. Formenti. Computing the periods of preimages in surjective cellular automata.Nat. Comput., 16(3):367–381, 2017
2017
-
[19]
Mariot, S
L. Mariot, S. Picek, A. Leporati, and D. Jakobovic. Cellular automata based s-boxes.Cryptogr. Commun., 11(1):41–62, 2019
2019
-
[20]
S. J. Phillips and N. C. Phillips. Strongly ideal secret sharing schemes.J. Cryptol., 5(3):185–191, 1992
1992
-
[21]
Sahai and B
A. Sahai and B. Waters. Fuzzy identity-based encryption. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, Proceedings, Lecture Notes in Computer Science, pages 457–473. Springer, 2005
2005
-
[22]
A. Shamir. How to share a secret.Commun. ACM, 22(11):612–613, 1979. 13
1979
-
[23]
D. R. Stinson.Combinatorial designs - constructions and analysis. Springer, 2004
2004
-
[24]
D. R. Stinson and S. A. Vanstone. A combinatorial approach to threshold schemes.SIAM J. Discret. Math., 1(2):230–236, 1988
1988
-
[25]
K. Sutner. De bruijn graphs and linear cellular automata.Complex Syst., 5(1), 1991
1991
-
[26]
S. Wolfram. Statistical mechanics of cellular automata.Reviews of modern physics, 55(3):601, 1983. 14
1983
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.