JOURNAL ARTICLE

Secure Secret Sharing Using Homomorphic Encryption

Abstract

Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing deals with splitting a secret information with various players. The goal of the secret sharing is security of secret, privacy and hiding information. There are numerous techniques available for secret sharing e.g. polynomial, Chinese remainder theorem, vector space, matrix projection. Techniques have characteristics like threshold, proactive, verifiable. Proactive secret sharing scheme allow user to change share in case of doubt of theft. In this work we propose the proactive secret sharing scheme based on homomorphic techniques. Our scheme consists of three phases of share construction, share renewal, share reconstruction. Central authority splits an encrypted secret with each parties using homomorphic property of paillier encryption i.e. subtraction. In renewal process two or more parties relate share with each other for to generated renewed share. In reconstruction process all parties share will be add to central authority then encrypted secret will be generated. Central authority will decrypt encrypted secret using secret key then original secret will be generated. Our schemes unique features is share can be renewed any time, Each party can choose secret of their own choice, If any two parties have same content share then also encrypted share will be different due to non-deterministic property of paillier encryption.

Keywords:
Homomorphic secret sharing Homomorphic encryption Computer science Secret sharing Encryption Computer security Verifiable secret sharing Secure multi-party computation Shamir's Secret Sharing Shared secret Theoretical computer science Cryptography Set (abstract data type)

Metrics

9
Cited By
0.59
FWCI (Field Weighted Citation Impact)
32
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Complexity and Algorithms in Graphs
Physical Sciences →  Computer Science →  Computational Theory and Mathematics

Related Documents

BOOK-CHAPTER

Secure Intrusion Detection based on Homomorphic Encryption and Secret Sharing

Peiyin Yao

Atlantis highlights in economics, business and management/Atlantis Highlights in Economics, Business and Management Year: 2025 Pages: 1010-1018
BOOK-CHAPTER

Secure Online Polling: Based on Homomorphic Encryption Using (n,n) Secret Sharing Scheme

Yogesh KumarArun Mishra

Communications in computer and information science Year: 2018 Pages: 590-600
BOOK-CHAPTER

Homomorphic Secret Sharing from Paillier Encryption

Nelly FazioRosario GennaroTahereh JafarikhahWilliam E. Skeith

Lecture notes in computer science Year: 2017 Pages: 381-399
© 2026 ScienceGate Book Chapters — All rights reserved.