Secret Sharing Schemes for Data Protection and Secure Communication: A Review
DOI:
https://doi.org/10.29304/jqcsm.2024.16.31639Keywords:
Secret sharing, Threshold cryptography, Data security, Authentication, Access control, Dynamic thresholds and BlockchainAbstract
Secret sharing, also one of the significant concepts, plays a vital role in computer science for guaranteed data security and secure communication with advanced digital security demands. This paper focuses on theoretical aspects, historical development, and various schemes of secret sharing using Shamir's polynomial-based and Blakely's geometric methods. Indeed, this importance in modern security is difficult to underestimate. It is based on a comprehensive literature review and the effectiveness of schemes in access control, data storage, and secure communications. From the evaluation, it can be seen that secret sharing prevents unauthorized access and secures against single points of failure very effectively; therefore, it finds wide usage in various secure applications. From this study, it can be concluded that secret sharing is a very flexible and core tool in the field of information security with possibilities for improvement up to the challenge of developing technological threats. The nature of the problem being addressed is the increasing need for superior protection in safeguarding sensitive data in a growing digital world
Downloads
References
Haryanto, E., Daeli, S., Riza, B., & Iriani, J., “Application of Method Threshold Secret Sharing in Securing Data,” Journal of Physics: Conference Series, vol. 1361, 2019.
Álvarez, Zakwan Jaroucheh and Iván Abellán, “Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution,” 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1-7, 2021.
Mohapatra, Bhawna Narwal and A., "Secured Secret Sharing and Reconstruction Algorithm for Organizations," 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), pp. 223-226, 2018.
Eisert, N. Walk and J., "Sharing Classical Secrets with Continuous-Variable Entanglement: Composable Security and Network Coding Advantage," PRX Quantum, p. 1, 2021.
Chang, Chuan Qin and Chanyu Jiang and Qun Mo and Heng Yao and Chinchen, "Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸)," IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, pp. 1928-1941, 2021.
Iwamura, A. Kamal and Keiichi, "Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)," SCIENCE AND TECHNOLOGY PUBLICATIONS, pp. 77-88, 2021.
Nair, P. Varghese and L., "A STUDY ON THE EXISTING THRESHOLD CRYPTOGRAPHY TECHNIQUES," International Journal of Advanced Research in Computer Science, pp. 70-73, 2020.
Ozdemir, B. Celiktas and Ibrahim Celikbilek and Enver, "A Higher-Level Security Scheme for Key Access on Cloud Computing," IEEE Access, vol. 9, pp. 107347-107359, 2021.
Panario, Rick Lopes de Souza and M. Vigil and Ricardo Felipe Custódio and Florian Caullery and Lucia Moura and D., "Secret Sharing Schemes with Hidden Sets," 2018 IEEE Symposium on Computers and Communications (ISCC), pp. 00713-00718, 2018.
Raylin Tso, Zi-Yuan Liu and Jen-Ho Hsiao 2, "Distributed E-Voting and E-Bidding Systems Based," electronics, 2019.
Seno, M. Azhar and Amin Hosseini, "A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment," Engineering and Technology Journal, pp. 172-180, 2021.
A. Shamsoshoara, "OVERVIEW OF BLAKLEYS SECRET SHARING SCHEME," arXiv Vanity, 2019.
Abdullah, Dyala R. Ibrahim and J. Teh and R., "An overview of visual cryptography techniques," Multimedia Tools and Applications, vol. 80, pp. 31927 - 31952, 2021.
Panigrahi, Dintomon Joy and M. Sabir and B. K. Behera and P., "Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer," Quantum Information Processing, vol. 19, pp. 1-4, 2018.
Toluee, Hossein Pilaram and T. Eghlidos and Rahim, "An efficient lattice-based threshold signature scheme using multi-stage secret sharing," IET Inf. Secur., vol. 15, pp. 98-106, 2020.
A. H. Wulan Sri Lestari, "Privacy-Preserving Collaborative Deep Learning," 2020 3rd International Conference on Mechanical, Electronics, Computer, and Industrial Technology (MECnIT), 2020.
Preneel, M. Sedaghat and Daniel Slamanig and Markulf Kohlweiss and B., "Structure-Preserving Threshold Signatures," IACR Cryptol. ePrint Arch, p. 839, 2022.
K. A. Nagaty, "A Secured Hybrid Cloud Architecture," Springer International Publishing Switzerland, 2015.
Zhang, Xiaoyan Chen and Weidong Xiao and Weijian Zhang and Qifeng Xie and Sujuan, "Research on Secret Sharing Scheme in CPS Environment," pp. 163-168, 2021.
lvarez, Zakwan Jaroucheh and Iva´n Abella´n A´, "Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution," {2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1-9, 2021.
Wang, Xuehu Yan and Yuliang Lu and Ching-Nung Yang and Xinpeng Zhang and Shudong, "A Common Method of Share Authentication in Image Secret Sharing," IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, pp. 2896-2908, 2021.
Song, Ziyu Niu and Hao Wang and Zhi Li and Xiangfu, "Privacy‐preserving statistical computing protocols for private set intersection," International Journal of Intelligent Systems, vol. 37, pp. 10118 - 10139, 2021.
Latoria, M. Sadim and Neeraj Pratap and Sunil Kumar and Akhilesh, "Hybrid neural synchronization blowfish algorithm for secret key exchange over public channels," Materials Today: Proceedings, 2021.
Zhang, Yange Chen and Hequn Liu and Baocang Wang and Baljinnyam Sonompil and Yuan Ping and Zhili, "A threshold hybrid encryption method for integrity audit without trusted center}," Journal of Cloud Computing, vol. 10, pp. 1-14, 2021.
Bhat, Parsa Sarosh and S. A. Parah and G. M., “Utilization of secret sharing technology for secure communication: a state-of-the-art review,” Multimedia Tools and Applications, pp. 517-541, 2020.
Adesso, oannis Kogias and Yu Xiang and Qiongyi He and G., "Unconditional security of entanglement-based continuous-variable quantum secret sharing," Physical Review A, vol. 95, pp. 1-5, 2016.
Fedorov, S. E. Yunakovsky and M. Kot and N. Pozhar and D. Nabokov and M. Kudinov and A. Guglya and E. Kiktenko and E. Kolycheva and A. Borisov and A., "Towards security recommendations for public-key infrastructures for production environments in the post-quantum era," EPJ Quantum Technology, vol. 8, pp. 1-19, 2021.
Venkatesan, K. Chitra and V., "An Antiquity to the contemporary of Secret Sharing Scheme," journal of Innovative Image Processing, 2020.
Fatima-tuz-Zahra, Ariessa Davaindran Lingham and Nelson Tang Kwong Kin and Chen Wan Jing and Chong Heng Loong and, "Implementation of Security Features in Software Development Phases," ArXiv, 2020.
Karanam, Tulasi Radhika Patnala and J. D. and Sankararao Majji and Manohar Valleti and Srilekha Kothapalli and S., "A Modernistic way for KEY Generation for Highly Secure Data Transfer in ASIC Design Flow," 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 892-897, 2020.
Fedorov, S. E. Yunakovsky and M. Kot and N. Pozhar and D. Nabokov and M. Kudinov and A. Guglya and E. Kiktenko and E. Kolycheva and A. Borisov and A., "Towards security recommendations for public-key infrastructures for production environments in the post-quantum era," EPJ Quantum Technology, pp. 1-17, 2021.
Chen, Jie Gu and Xiao-Yu Cao and Hua-Lei Yin and Zeng-Bing, "Differential phase shift quantum secret sharing using a twin field.," Optics express, pp. 9165-9173, 2021.
Fraga-Lamas, T. Fernández-Caramés and P., "owards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks," IEEE Access, vol. 8, pp. 21091-21116, 2020.
Sun, Keyan Cao and Yefan Liu and Gongjie Meng and Qimeng, "An Overview on Edge Computing Research," IEEE Access, vol. 8, pp. 85714-85728, 2020.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Ahmed Basil Mageed, Loay E. George
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.