Analysis of the applicability of existing secret separation schemes in the post-quaternary era
Annotation
Modern approaches to secret sharing have been examined, encompassing both classical and post-quantum cryptographic schemes. The study explores methods for distributing secret information among multiple participants using various mathematical primitives, such as Lagrange and Newton polynomials, the Chinese remainder theorem, error-correcting codes, lattice theory, elliptic curve isogenies, multivariate equations, and hash functions. A comparative analysis of different schemes is provided in terms of their resistance to quantum attacks, efficiency, and compliance with Shamir’s criteria. Special attention is given to assessing the schemes resilience against attacks using quantum computers, which is particularly relevant given the advancement of quantum technologies. The advantages and disadvantages of each scheme are discussed, including their computational complexity, flexibility, and adaptability to various conditions. It is shown that classical schemes, such as those by Shamir and Newton, remain efficient and easy to implement but are vulnerable to quantum attacks. Meanwhile, post-quantum schemes based on lattice theory demonstrate a high level of security but require more complex computations.
Keywords
Постоянный URL
Articles in current issue
- Explainability and interpretability are important aspects in ensuring the security of decisions made by intelligent systems (review article)
- Intensification of sol-gel synthesis of Mn-containing MgO-Al2O3-ZrO2-SiO2 system materials
- Conformational properties of polymer brushes with aggrecan-like macromolecules under strong stretching conditions on a cubic lattice
- Atmospheric air-phase singlet oxygen generator for practical multifunctional applications
- Two-stage algorithm for underwater image recovery for marine exploration
- Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
- Investigation of the possibility of using evolutionary algorithms for conditional generation of attributed graphs
- Deep learning-enhanced contour interpolation techniques for 3D carotid vessel wall segmentation
- Detecting fraud activities in financial transactions using SMOTENN model
- A deep learning approach for adaptive electrocardiogram-based authentication in an internet of things enabled telehealth system
- Method for identifying the active module in biological graphs with multi-component vertex weights
- Modeling of nonlocal porous functionally graded nanobeams under moving loads
- Design of the microelectromechanical logic element based on a comb-drive resonator
- Critical loads of antisymmetric and mixed forms of buckling of a CCCC-nanoplate under biaxial compression
- On the properties of compromise M-estimators optimizing weighted L2-norm of the influence function
- Combined approach to fault detection in complex technical systems based on bond-graph model
- Feature extraction methods for metagenome de Bruijn graphs collections based on samples classification information
- Automatic calibration of the receiving line of information and control systems in real time
- Model for storing spatial data of tensor geophysical fields
- Boundary estimation of the reliability of cluster systems based on the decomposition of the Markov model with limited recovery of nodes with accumulated failures