当前位置: X-MOL 学术Comput. Sci. Rev. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secret sharing: A comprehensive survey, taxonomy and applications
Computer Science Review ( IF 12.9 ) Pub Date : 2023-11-30 , DOI: 10.1016/j.cosrev.2023.100608
Arup Kumar Chattopadhyay , Sanchita Saha , Amitava Nag , Sukumar Nandi

The emergence of ubiquitous computing and different disruptive technologies caused magnificent development in information and communication technology. Likewise, cybercriminals are also carefully considering different newer ways of attacks. Protecting the confidentiality, integrity, and authentication of sensitive information is the day’s major challenge. Secret sharing is a method that allows a trusted authority (the dealer) to distribute a secret or a number of secrets among some target participants with the intention that certain predetermined groups of participants can collaborate to recover the secret or secrets. Any other group formed by the participants cannot do so. Threshold secret sharing (TSS) is a particular form of secret sharing. It permits any group consisting of at least a specific number (called the threshold) of participants to reconstruct the secret or secrets. However, any group with fewer than the specified number of participants is forbidden to do so. It provides tolerance against single point of failure (SPOF), which has attracted a large number of researchers to contribute in this field. It has the potential to be implemented in numerous practical and secure applications. In this paper, we present a comprehensive survey of a variety of existing threshold secret sharing schemes. We have identified various aspects of developing secure and efficient secret sharing schemes. We have also highlighted some of the applications based on secret sharing. Finally, the open challenges and future research directions in the field of secret sharing are identified and discussed.

中文翻译:

秘密分享:全面的调查、分类和应用

普适计算和各种颠覆性技术的出现,引发了信息通信技术的巨大发展。同样,网络犯罪分子也在仔细考虑不同的新攻击方式。保护敏感信息的机密性、完整性和身份验证是当今的主要挑战。秘密共享是一种允许受信任的机构(交易者)在一些目标参与者之间分发一个或多个秘密的方法,目的是让某些预定的参与者组可以协作恢复这个或多个秘密。参与者组成的任何其他团体都不能这样做。阈值秘密共享(TSS)是秘密共享的一种特殊形式。它允许任何由至少特定数量(称为阈值)的参与者组成的组来重建一个或多个秘密。但参加人数少于规定人数的团体不得参加。它提供了对单点故障(SPOF)的容忍能力,吸引了大量研究人员在该领域做出贡献。它有可能在许多实际和安全的应用中实现。在本文中,我们对各种现有的门限秘密共享方案进行了全面的调查。我们已经确定了开发安全高效的秘密共享方案的各个方面。我们还重点介绍了一些基于秘密共享的应用程序。最后,确定并讨论了秘密共享领域的开放挑战和未来的研究方向。
更新日期:2023-11-30
down
wechat
bug