
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,188,646 |
PDF Download | 5,620,932 |
Survey and analysis of several secret sharing schemes based on interepulation methods | ||
پدافند الکترونیکی و سایبری | ||
Article 2, Volume 12, Issue 1 - Serial Number 45, June 2024, Pages 11-20 PDF (1.07 M) | ||
Document Type: Original Article | ||
Authors | ||
Mohammad Ebrahim Ebrahimi Kiasari1; Abdul Rasool Mir Qadri* 2; Mojtaba nazari3; Nasrollah Pakniat4 | ||
1Ph.D. student, Department of Mathematics, Khorramabad Branch, Islamic Azad University, Khorramabad, Iran | ||
2Associate Professor, Faculty and Research Institute of Information and Communication Technology, Imam Hossein University (AS), Tehran, Iran | ||
3Assistant Professor of Mathematics Department, Khorramabad Branch, Islamic Azad University, Khorramabad, Iran | ||
4Associate Professor, Information Science Research Institute, Iran Information Science and Technology Research Institute (Irandak), Tehran, Iran | ||
Receive Date: 26 June 2023, Revise Date: 12 September 2023, Accept Date: 11 October 2023 | ||
Abstract | ||
The Secret sharing is one of the fascinating topics of cryptography, which is widely used in information security. The aim of secret sharing is a process in which one or more secrets are shared between a number of qualified participants or with different credentials. In times when there is a need to recover a secret, a number of people, whom we call authorized people, collect their shares to recover the desired secret. So far, various types of secret sharing schemes based on interpolation have been proposed. In these secret sharing plans, different interpolations have been used, depending on the structural needs of the plan. In this article, some secret sharing schemes based on interpolation are introduced and reviewed. Then by analyzing and comparing the characteristics of these schemes, we conclude that the two secret sharing schemes based on Berkhoff interpolation have better efficiency than the other reviewed schemes. | ||
Keywords | ||
Cryptography; Secret sharing scheme; Threshold secret sharing; Brekkhof interpulation | ||
Main Subjects | ||
Information security, encryption, encryption, protocols and standards | ||
References | ||
| ||
Statistics Article View: 1,203 PDF Download: 224 |