Design of a Secret Sharing Scheme with Mandatory Subgroup Participation


Kapalova N. Dyusenbayev D. Khompysh A. Algazy K.
September 2025Multidisciplinary Digital Publishing Institute (MDPI)

Applied Sciences (Switzerland)
2025#15Issue 17

This paper proposes an approach based on a secret sharing scheme with the mandatory participation of predefined subgroups. The proposed scheme allows secret reconstruction only when representatives from each designated group of participants (e.g., cloud providers, legally independent parties, etc.) are present. This mechanism enhances resistance to internal collusion, strengthens access control, and enables distributed management. The structure and mathematical foundations of the proposed scheme are presented, along with an analysis of its properties. A cryptanalysis is conducted, evaluating the scheme’s resilience to various types of attacks, and the results are discussed. The computational complexity of the algorithm is also analyzed, and its resource efficiency is confirmed.

biometric identification , Chinese remainder theorem , cryptographic reliability , interpolation polynomial , secret sharing , Shamir’s scheme

Text of the article Перейти на текст статьи

Institute of Information and Computational Technologies, Almaty, 050010, Kazakhstan
Faculty of Languages and Humanities, Egyptian University of Islamic Culture Nur-Mubarak, Almaty, 050016, Kazakhstan

Institute of Information and Computational Technologies
Faculty of Languages and Humanities

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026