JOURNAL ARTICLE

Encryption Application Using Verifiable Secret Sharing Scheme

Abstract

Secret sharing scheme is used to produce a secret key obtained from a calculation against a certain number of keys in a group. The problem occurs when one or more keys in the group are fake or intentionally faked. A verifiable secret sharing system is proposed in this paper so that it detects any fake keys in a group before being used for resulting the right secret key. Initial system definitions are the basis for writing codes in its system development. Units and integration test is implemented when all units of the system is ready. Repetition is applied to its development stages until the test results show that all system functionalities are working as expected and the system has succeeded in detecting fake keys in the group.

Keywords:
Verifiable secret sharing Secret sharing Computer science Homomorphic secret sharing Encryption Computer security Scheme (mathematics) Key (lock) Shamir's Secret Sharing Secure multi-party computation Group (periodic table) Theoretical computer science Cryptography Mathematics Set (abstract data type) Programming language

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
10
Refs
0.15
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

A verifiable multi-secret image sharing scheme based on DNA encryption

Arup Kumar ChattopadhyaySanchita SahaAmitava NagJyoti Prakash Singh

Journal:   Multimedia Tools and Applications Year: 2024 Vol: 84 (4)Pages: 1967-1983
JOURNAL ARTICLE

Unconditionally Secure Verifiable Secret Sharing Scheme

Changlu LinLein Harn

Journal:   INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences Year: 2012 Vol: 4 (17)Pages: 514-518
BOOK-CHAPTER

Verifiable Rational Multi-secret Sharing Scheme

Yongquan CaiZhanhai LuoYi Yang

Communications in computer and information science Year: 2011 Pages: 42-48
© 2026 ScienceGate Book Chapters — All rights reserved.