Secret sharing allows a dealer to distribute a secret among a set of parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020 [80]) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing a novel access structure hiding verifiable secret sharing scheme that supports all monotone access structures. Our scheme is the first secret sharing solution to support malicious behavior identification and share verifiability in malicious-majority settings. Furthermore, the verification procedure of our scheme incurs no communication overhead, and is therefore “free”. As the building blocks of our scheme, we introduce and construct the following:•a set-system with greater than exp(c2(logh)2(loglogh))+2exp(c(logh)2(loglogh)) subsets of a set of h elements. Our set-system, H, is defined over Zm, where m is a non-prime-power. The size of each set in H is divisible by m while the sizes of the pairwise intersections of different sets are not divisible by m unless one set is a (proper) subset of the other,•a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of Zq⁎, where q is the LWE modulus. Our scheme arranges parties as nodes of a directed acyclic graph and employs modulus switching during share generation and secret reconstruction. For a setting with ℓ parties, our (non-linear) scheme supports all 22ℓ−O(logℓ) monotone access structures, and its security relies on the hardness of the LWE problem. Our scheme's maximum share size, for any access structure, is:(1+o(1))2ℓπℓ/2(2qϱ+0.5+q+Θ(h)), where ϱ≤1 is a constant. We provide directions for future work to reduce the maximum share size to:1l+1((1+o(1))2ℓπℓ/2(2qϱ+0.5+2q)), where l≥2. We also discuss three applications of our secret sharing scheme.