This paper proposes an approach based on a secret sharing scheme with the mandatory participation of predefined subgroups. The proposed scheme allows secret reconstruction only when representatives from each designated group of participants (e.g., cloud providers, legally independent parties, etc.) are present. This mechanism enhances resistance to internal collusion, strengthens access control, and enables distributed management. The structure and mathematical foundations of the proposed scheme are presented, along with an analysis of its properties. A cryptanalysis is conducted, evaluating the scheme’s resilience to various types of attacks, and the results are discussed. The computational complexity of the algorithm is also analyzed, and its resource efficiency is confirmed.
Building similarity graph...
Analyzing shared references across papers
Loading...
Нурсулу Капалова
Dilmukhanbet Dyusenbayev
Ардабек Хомпыш
Applied Sciences
Institute of Information and Computational Technologies
Building similarity graph...
Analyzing shared references across papers
Loading...
Капалова et al. (Sat,) studied this question.
www.synapsesocial.com/papers/68c1824b9b7b07f3a060e9d7 — DOI: https://doi.org/10.3390/app15179550