Design of a Secret Sharing Scheme with Mandatory Subgroup Participation
Kapalova N. Dyusenbayev D. Khompysh A. Algazy K.
September 2025Multidisciplinary Digital Publishing Institute (MDPI)
Applied Sciences (Switzerland)
2025#15Issue 17
This paper proposes an approach based on a secret sharing scheme with the mandatory participation of predefined subgroups. The proposed scheme allows secret reconstruction only when representatives from each designated group of participants (e.g., cloud providers, legally independent parties, etc.) are present. This mechanism enhances resistance to internal collusion, strengthens access control, and enables distributed management. The structure and mathematical foundations of the proposed scheme are presented, along with an analysis of its properties. A cryptanalysis is conducted, evaluating the scheme’s resilience to various types of attacks, and the results are discussed. The computational complexity of the algorithm is also analyzed, and its resource efficiency is confirmed.
biometric identification , Chinese remainder theorem , cryptographic reliability , interpolation polynomial , secret sharing , Shamir’s scheme
Text of the article Перейти на текст статьи
Institute of Information and Computational Technologies, Almaty, 050010, Kazakhstan
Faculty of Languages and Humanities, Egyptian University of Islamic Culture Nur-Mubarak, Almaty, 050016, Kazakhstan
Institute of Information and Computational Technologies
Faculty of Languages and Humanities
10 лет помогаем публиковать статьи Международный издатель
Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026