Abstract

In this paper, we propose a new approach to the construction of computationally secure secret sharing scheme based on the simultaneous use of the Residue Number System (RNS), as the symmetric encryption, and the perfect Asmuth- Bloom secret sharing scheme. We combine the useful features of Redundant RNS to design space efficient secret sharing scheme with enough level of security and to control of data integrity. This combination provides verifiability and achieves a high speed of data processing.

Keywords:
Verifiable secret sharing Computer science Secret sharing Scheme (mathematics) Homomorphic secret sharing Encryption Secure multi-party computation Cloud computing Cloud storage Shamir's Secret Sharing Security analysis Cryptography Data sharing Theoretical computer science Computer security Distributed computing Computer network Mathematics Operating system

Metrics

9
Cited By
1.39
FWCI (Field Weighted Citation Impact)
43
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Residue Arithmetic
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Unconditionally Secure Verifiable Secret Sharing Scheme

Changlu LinLein Harn

Journal:   INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences Year: 2012 Vol: 4 (17)Pages: 514-518
BOOK-CHAPTER

Verifiable Rational Multi-secret Sharing Scheme

Yongquan CaiZhanhai LuoYi Yang

Communications in computer and information science Year: 2011 Pages: 42-48
JOURNAL ARTICLE

A (n,t,n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction

Meng LiShaoyun QuTiantian XunJia Yu

Journal:   International Journal of Security and Its Applications Year: 2015 Vol: 9 (1)Pages: 191-204
© 2026 ScienceGate Book Chapters — All rights reserved.