Next Article in Journal
State Space Correspondence and Cross-Entropy Methods in the Assessment of Bidirectional Cardiorespiratory Coupling in Heart Failure
Previous Article in Journal
Exploring Non-Gaussianity Reduction in Quantum Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ApproximateSecret Sharing in Field of Real Numbers

1
College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
2
Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(7), 769; https://doi.org/10.3390/e27070769
Submission received: 18 March 2025 / Revised: 1 July 2025 / Accepted: 8 July 2025 / Published: 20 July 2025
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

In the era of big data, the security of information encryption systems has garnered extensive attention, particularly in critical domains such as financial transactions and medical data management. While traditional Shamir’s Secret Sharing (SSS) ensures secure integer sharing through threshold cryptography, it exhibits inherent limitations when applied to floating-point domains and high-precision numerical scenarios. To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. By categorizing real numbers into four types—rational numbers, special irrationals, common irrationals, and general irrationals—our approach achieves lossless transmission for rational numbers, special irrationals, and common irrationals, while enabling low-loss recovery for general irrationals. The scheme leverages a type-coding system to embed data category identifiers in polynomial coefficients, combined with Bernoulli-distributed random bit injection to enhance security. The experimental results validate its effectiveness in balancing precision and security across various real-number types.

1. Introduction

In recent years, with the rapid development of the economy, people’s demands for privacy protection, multi-party computing [1], IoT security [2], key management [3], and identity authentication [4,5] have grown exponentially. Since Shamir and Blakley first introduced the concept of secret sharing in 1979 [6,7], Shamir secret sharing (SSS) has gained widespread adoption in scenarios such as image transmission [8,9,10,11], edge computing [12], data management [13,14], and 5G networks [15], owing to its information-theoretic security and mathematical simplicity. However, the proliferation of diverse data types in these domains—ranging from floating-point weights in machine learning models [16] to decimal-based financial transactions [17] and irrational numbers in scientific computations—has exposed a critical limitation: SSS operates exclusively in finite domains like GF (p), restricting secrets and shares to integers.
For instance, in machine learning, neural network weights (typically floating-point numbers) [16] must be scaled to integers for sharing, requiring reverse quantization that may introduce errors. Financial transactions involving decimals [17] face similar challenges, with precision loss or increased computational complexity arising from integer conversion. Scientific computations, which often involve infinite recurring decimals and irrationals, are particularly vulnerable to significant errors due to truncation or approximation [18,19,20]. Meanwhile, applications in real-number fields [21,22] demand secure handling of non-integer data, highlighting the urgent need for SSS extensions beyond integer domains.
Existing solutions predominantly fall into two categories:
  • Floating-point arithmetic protocols [23,24], which encode different number types in finite fields and employ Boolean operations alongside SSS to ensure transmission security, though their effectiveness hinges on communication quality;
  • Decimal scaling methods, which convert secrets to integers for SSS, sacrificing support for irrational numbers altogether. Both approaches fail to address the fundamental challenge of representing irrational numbers precisely, leaving receivers unable to quantify accuracy degradation and introducing data loss in high-precision contexts.
Challenges: The precise representation of irrational numbers remains a computational hurdle, as truncating decimals or relying on approximations leads to irreversible information loss. Traditional methods, whether through encoding conversions or scaling, struggle to balance data integrity and transmission security, particularly in scenarios requiring high-fidelity secret reconstruction.
Contributions: Building on the core architecture of traditional SS, this paper introduces a novel type code system to enable real-number secret sharing. Real numbers are categorized into four types: rational numbers (finite decimals, fractions, infinite repeating decimals), general irrationals, special irrationals, and common irrationals, which are assigned unique type codes for backward compatibility and version-aware decoding. This framework ensures lossless transmission for rational numbers, special irrationals and common irrationals, while minimizing precision loss for general irrationals via bounded significant digit truncation. Security is reinforced through the following methods:
  • Bernoulli-distributed random bit injection, which guarantees uniqueness across different encoding instances of the same number, resisting statistical analysis-based brute-force attacks;
  • Type code obfuscation, which strategically distributes critical identifiers ) across non-adjacent encoding components, significantly increasing reverse-engineering difficulty;
  • Dynamic extension mechanisms for special irrational numbers, which enhance cryptographic resilience through position-variable encoding structures.
Inspiration from recent advancements in chaotic maps further enriches this work. For example, the 3D memristive cubic map with dual discrete memristors [25] demonstrates how hardware-implementable chaotic systems can generate high-quality random key streams for secure multi-party computation, while the DCT compression-based image privacy scheme [26] highlights the feasibility of integrating real-number processing with cryptographic primitives. These studies underscore the importance of hybrid architectures that handle mixed data types (integers, reals, irrationals) efficiently, informing our design of a versatile SSS framework for image encryption and beyond.

2. Preliminary

In this section, we introduced the basic definitions and preliminaries used in this paper, including SS number classification.

2.1. Shamir Secret Sharing

The Shamir secret-sharing scheme (SSS) [6,7] is a distributed cryptography protocol based on polynomial interpolation, which was proposed by Adi Shamir in 1979. The core idea is to divide the secret into multiple shares and ensure through a threshold mechanism that the secret can only be recovered when a sufficient number (threshold) of shares are collected. The core concept of the scheme is described below:
  • Secret (r): sensitive information that needs to be protected;
  • Share ( S C ): distribute the multiple data points generated after splitting the secret to different participants;
  • Threshold (k): the minimum number of shares required to restore the secrecy;
  • n: The total number of generated shares (n ≥ k);
  • Finite field, G F ( p ) : all operations are carried out in the prime number field.
For the process of secret distribution, the first step is to set parameters. Select a large prime number p. The value of p should be as large as possible to avoid brute-force enumeration of the secret. Additionally, set the threshold k and the total number of shares n. Generate a polynomial:
F ( x ) = r + a 1 x + a 2 x 2 + . . . + a ( k 1 ) x ( k 1 ) mod p
The constant term r refers to the secret that needs to be kept confidential. Each participant is assigned a unique non-zero identifier, x i ( x i [ 1 , n ] , and each x i is also different), which allows us to calculate the corresponding function values:
S C i = F ( x i ) mod p
Each share here represents ( x i , S C i ), Then, we distribute n shares.
When the receiver receives at least k shares, it can reconstruct the polynomial using Lagrange interpolation.
The SSS demonstrates several notable advantages. Primarily, it exhibits robust security properties, as an adversary possessing k 1 shares cannot obtain any information about the secret. Secondly, the scheme features a flexible threshold mechanism that supports arbitrary ( k , n ) threshold configurations, with the distinctive capability of adjusting thresholds without necessitating the regeneration of all shares. Furthermore, both the polynomial generation and Lagrange interpolation processes maintain a computational complexity of O ( k ) , resulting in low computational overhead for secret recovery. This efficiency renders the scheme particularly suitable for large-scale distribution scenarios.
However, the scheme is not without limitations.A critical vulnerability arises from potential share corruption during transmission, which can be caused by either adversarial actions (e.g., attackers forging shares during distribution) or unintentional errors introduced by the distributor. Such corruptions can lead to erroneous secret reconstruction. Additionally, when dealing with lower-degree polynomials (e.g., k = 2), the scheme may exhibit structural weaknesses that could compromise its security robustness.

2.2. Number Classification

We classify real numbers into four categories: rational numbers, general irrational numbers, special irrational numbers, and common irrational numbers.
  • Rational number ( Q ): A number of the form a b , where a , b Z and b 0 . a is the numerator.
  • Special irrational number ( CrQ s ): An irrational number that can be simplified to a rational form after raising to a power. It is specifically expressible as a b I , where
    a , b Z , b 0 , I N + ( I 2 )
    If I is even, a b 0 must hold.
  • Common irrational number ( CrQ p ): Numbers of the form π v or e v , where v N * (e.g.,  π 2 , e 5 ). Note: Only strictly π v or e v forms are recognized as common irrational numbers. Numbers like e 3 or π 2 or π e are classed as general irrational numbers.
  • General irrational number ( CrQ G ): Numbers satisfying r R and r CrQ p Q CrQ s . Examples include
    2 ln 2 , e 3

3. The Proposed Scheme

This section is organized into three sections. The first section provides an overview of our proposed scheme. The second section delves into the design approach and its underlying principles. The final section offers a general discussion of the scheme’s characteristics and implications.

3.1. Overview

Existing schemes are often limited to a certain bit range for secret sharing, discarding any fractional parts beyond that range. The receiver cannot determine whether the received data has lost part of its precision. To address this issue, we leverage the a 1 component of the SSS to embed specific information reflecting its type, ensuring security by incorporating substantial random bits into a 1 . Due to the complexity of real numbers, as mentioned in the previous text, we classify them into four categories: rational numbers, general irrational numbers, common irrational numbers, and special irrational numbers. We assign specific type codes to each category so that the receiver can fully obtain the original information. The basic algorithm approach is as follows Figure 1:
The symbol explanations in this scheme are as follows Table 1:

3.2. Algorithm Design

The algorithm can be divided into three main steps: real number standardization, type code length determination, and encoding structure specification.
  • Real number standardization
    If r G r Q G , its scientific notation representation is given by
    r = a × 10 λ , where 1 | a | < 10 and λ Z .
    We extract the first eight significant digits from a and perform rounding to obtain α , satisfying
    α = Round ( a , 8 ) = a + O ( 10 8 ) ,
    where Round ( a , 8 ) denotes rounding a to eight significant digits. Then, the preprocessed form of r is
    r = α × 10 λ .
    Perform standardization transformation on secret r R :
    r a b , a , b Z , b 0 if r Q α × 10 λ if λ N , and r CrQ G π v or e v , v Z , v 0 if r CrQ p a b I , a , b , I Z , b , I 0 if r CrQ s
  • Type code length determination
    The type code length ( T ) follows
    ( T ) = 8 if r Q 16 if r CrQ p 4 · ( W ) ( dynamic extension mechanism ) if r CrQ s o r r CrQ G
    For special irrational numbers ( CrQ s ), ( T ) is determined by a dynamic extension mechanism. Let the bit-length of radical I be
    ( W ) = 2 log 2 ( len ( bin ( I ) ) )
    For general irrational numbers, the determination of ( T ) also adopts a dynamic expansion mechanism.
    The dynamic expansion mechanism automatically adjusts the length based on the binary representation length of λ .
    The code length parameters for different types are shown in Table 2:
    Table 2. Code length determination rules.
    Table 2. Code length determination rules.
    Type ( T ) ( W ) ( Random ) Code Length Determination Rule
    Rational Number804 ( T ) = 8
    General Irrational 4 · ( W ) 2 log 2 ( bin ( λ ) ) 3 · ( W ) 4 Dynamic expansion mechanism
    Common Irrational16111 ( T ) = 16
    Special Irrational 4 · ( W ) 2 log 2 ( ( bin ( n ) ) ) 3 · ( W ) 4 Dynamic expansion mechanism
  • Encoding Structure Definition
    The type code T = ( t 1 t 2 t n ) follows a strict binary concatenation scheme:
    T = t 1 t 2 t 3 W Random s
    with components defined as
    (a)
    Data type code ( t 1 t 2 ):
    ( t 1 t 2 ) = 00 r Q 01 r CrQ s 10 r CrQ G 11 r CrQ p
    (b)
    Component flag ( t 3 ):
    t 3 = 0 S ( r ) = a 1 S ( r ) = b where S ( r ) = a ( numerator ) b ( denominator )
    Among them, if the secret is a general irrational number, then this bit is transformed into a reserved sign bit, which is used to mark the sign of the reserved bit:
    t 3 = 0 if λ 0 1 if λ 0
    (c)
    Reserved Field (W):
    W = 1 if r = π 0 if r = e 00 0 ( T ) ( bin ( n ) ) bin ( n ) if r CrQ s or r CrQ G
    where ( I ) = len ( bin ( I ) ) and ( W ) = 2 log 2 ( I )
    (d)
    Random Bits ( Random ):
    Bernoulli ( 0.5 ) , ( Random ) = 4 r Q 11 r CrQ p ( T ) ( D ) ( W ) 1 r CrQ s CrQ G
    (e)
    Sign Bit (s):
    s = 0 r 0 1 r < 0
    The specific parameter settings are shown in the Table 3.
    Table 3. Encoding structure parameters.
    Table 3. Encoding structure parameters.
    FieldLengthValue SpaceDescription
    t 1 t 2 2 bits00-11Data type
    t 3 1 bit0-1Marker bit or Reserved sign bit
    WVariableBinaryReserved bit
    RandomVariableBernoulli (0.5)Random bit
    s1 bit0-1Positive and negative identification bit
  • Case Studies
    (a)
    Special irrational number example: 2 1 20000
    • Data type: t 1 t 2 = 01 (special irrational)
    • Maker bit: t 3 = 0 (numerator encoding for 2)
    • Reserved field (W):
      I = 20000 bin ( I ) = 100111000100000 , ( W ) = 16 ( T ) = 64
      W = 0 1 - bit   pad 100111000100000
    • Final type code structure for numerator: 01 0 0100111000100000 XX X s
    (b)
    Common irrational number example: π 4
    • Type code: t 1 t 2 = 11 (common irrational)
    • Component flag: t 3 = 0 (numerator π )
    • Reserved field ( W = 1 for π )
    • Final type code for numerator: 11 type 0 marker 1 W XXXXXXXXXXX Random 0 sign
  • Secret reconstruction
    When k valid shares are received, reconstruct the polynomial using Lagrangian interpolation:
    (a)
    Define basis polynomials:
    L i ( x ) = 1 j k j i x x j x i x j mod p
    satisfying
    L i ( x j ) = 1 if i = j 0 if i j
    (b)
    Reconstruct the polynomial:
    F ( x ) = i = 1 k y i · L i ( x ) mod p
    (c)
    Recover secret coefficients:
    a 0 = F ( 0 ) a 1 = Solve from F ( x ) using a 0
  • Theoretical error bounds and error distribution analysis
    For general irrational numbers, analyze the error bounds and error distribution when truncating to eight decimal places.
    (a)
    The theoretical error bound: Suppose x is an irrational number, its true value is x, and the value after truncation to eight decimal places is x . Then the truncation error ϵ can be expressed as
    ϵ = | x x |
    Since it is truncated to eight decimal places, the maximum possible error occurs at the ninth decimal place. Therefore, the theoretical error bound can be expressed as
    ϵ 0.5 × 10 8
    This is because the maximum error occurs when the ninth digit is five (in the case of rounded boundaries), at which point the error is 0.5 × 10 8 .
    (b)
    Hypothesis of error distribution: Suppose the truncation error ϵ is uniformly distributed within its theoretical error range. That is,
    ϵ U n i f o r m ( 0 , 0.5 × 10 8 )
    This means that the error ϵ is uniformly distributed over the interval [ 0 ,   0.5 × 10 8 ] . This assumption is based on the following considerations:
    i
    Randomness: The decimal part of an irrational number is random, so the truncation error can be regarded as random.
    ii
    Uniform distribution assumption: Since the decimal parts of irrational numbers exhibit no regularity, it is reasonable to assume that truncation errors will arise within the error bounds predicted by uniform distribution theory.
    (c)
    Experimental verification. The experimental results mentioned in the paper show that the actual error is usually on the order of 10 8 , which is consistent with the theoretical error bound and error distribution assumptions. Specifically,
    i
    Maximum error: The maximum error observed in the experiment is close to 0.5 × 10 8 , which is consistent with the theoretical error bound.
    ii
    Average error: As the error is uniformly distributed within [ 0 ,   0.5 × 10 8 ] , the average error is approximately 0.25 × 10 8 .
    Through theoretical analysis and experimental verification, we can draw the following conclusions:
    i
    Theoretical error bound: For an ordinary irrational number truncated to eight decimal places, its theoretical error bound is 0.5 × 10 8 .
    ii
    The error distribution hypothesis: There will be truncation errors in [ 0 ,   0.5 × 10 8 ] uniform distribution. This is a reasonable and acceptable assumption, and this was also confirmed in the experiment.

3.3. General Analysis

3.3.1. Rational and General Irrational Numbers: General Proof

Assuming the secret to be transmitted is r Q , perform standardization by expressing r as a / b . For numerator a, assign data type 000XXXXs, and for denominator b, assign data type 001XXXX0 according to previous algorithms. Construct two independent polynomials for the SS scheme:
F a ( x ) = a 0 ( a ) + a 1 ( a ) x + a 2 ( a ) x 2 + + a k 1 ( a ) x k 1 mod p
F b ( x ) = a 0 ( b ) + a 1 ( b ) x + a 2 ( b ) x 2 + + a k 1 ( b ) x k 1 mod p
where a 0 ( a ) = a , a 0 ( b ) = b , a 1 ( a ) = T a , and  a 1 ( b ) = T b . Generate n shares for each of a and b:
{ ( x i , F a ( x i ) ) } i = 1 n and { ( x i , F b ( x i ) ) } i = 1 n
If the receiver obtains k or more shares, they can reconstruct a 0 and a 1 , thereby recovering the original numerator a. Similarly, the denominator b can be recovered, reconstructing the original number a / b . This demonstrates the generality of the scheme. For regular irrational numbers, simply take eight decimal places and change the type code to 00. Algorithm 1 presents the secret-sharing scheme for rational numbers.
Algorithm 1 Secret-sharing encryption algorithm for rational numbers
Require:  r Q
Ensure:  F ( x i ) where x i [ 1 , n ]
  1: Step 1: Convert r to a / b form, where T a = 000 XXXXs and T b = 001 XXXX 0
  2: Step 2: For T a , set a 1 = T a and a 0 = a . Substitute this into the polynomial
F ( x ) = a 0 + a 1 x + a 2 x 2 + + a k 1 x k 1 mod p

  3: Step 3: Output F ( x i ) where x i [ 1 , n ]
Note: Ensure all mathematical operations are performed in the finite field modulo p, where p is a large prime number greater than all possible coefficients.

3.3.2. General Proof for Special Irrational Numbers

Assume the special irrational number to be transmitted is a / b I . First compute W = bin ( I ) . Following the prefix allocation principle described previously, the type codes are 010WXX…Xs and 011WXX…Xs for the numerator and denominator, respectively.
For the numerator’s polynomial construction,
F ( x ) = a 0 + a 1 x + a 2 x 2 + + a k 1 x k 1 mod p
where a 0 = a (numerator value) and a 1 = 010 WXX …X. Select n shares x 1 , x 2 , , x n , compute corresponding F ( x i ) values, then distribute all shares. If receivers obtain more than k shares, they can reconstruct a 0 and a 1 .
The receiver recognizes special irrational numbers through the 01 prefix and determines numerator/denominator from the third bit. The data type length reveals ( W ) . By removing the leading 0, I is recovered for radical reconstruction. The denominator follows the same procedure.The entire algorithm process is as shown in the Algorithm 2.
Algorithm 2 Secret-sharing encryption algorithm for special irrational numbers
Require:  a / b I C r Q s
Ensure:  F ( x i ) where x i [ 1 , n ]
  1: Step 1: I b i n ( I ) W
  2: Step 2: Assign type codes:
  3:  T a 010 WXXX X s (numerator),
  4:  T b 011 WXX X 0 (denominator)
  5: Step 3: For numerator a, set coefficients:
  6:  a 1 T a , a 0 r . Construct polynomial:
F ( x ) = a 0 + a 1 x + a 2 x 2 + + a k 1 x k 1 mod p

  7: Step 4: Output shares F ( x i ) , x i [ 1 , n ]
Key features:
  • Type code structure embeds radical degree I in binary form (W).
  • Header bits 01 identify special irrationals.
  • Third-bit differentiation: 0 for numerator, 1 for denominator.
Note: The denominator polynomial construction follows the same pattern with T b and b 0 = denominator value . All arithmetic operations must preserve the W-bit radical specification field during reconstruction.

3.3.3. A General Analysis of the Rational Nature of Common Irrationals

To transmit the commonly used irrational number m v , where m is one of the common irrational numbers π , e, we assign a type code to both the numerator and the denominator. The type code for the numerator is encoded as 110 W X X X X X X X X X X X s (where the reserved bits are determined by the specific irrational number being transmitted; if it is π , the reserved bit is 0, and if it is e, the reserved bit is 1). The type code for the denominator depends on its specific type.
For the numerator, we select x i , i [ 1 , n ] as a set of values. We evaluate as the Algorithm 3, resulting in F ( x i ) , i [ 1 , n ] . After obtaining all these evaluations, we distribute them. If the receiver obtains k or more evaluations, they can solve for the coefficients a 1 . By examining the prefix 110 W and the sign bits, we can determine the numerator m. Similarly, we can decode the denominator v, thereby obtaining the original number m v .
Algorithm 3 The secret-sharing encryption algorithm for common irrationals
Input:  m v , v C r Q p , v R ;
Output:  F ( x i ) , x i [ i , n ] ;
 Step 1: T m = 110 W X X X . . . X s , T v = 001 X X X X s ;
 Step 2: For v, set a 1 = T v and a 0 = v , substitute into F ( x ) = a 0 + a 1 x + a 2 x 2 + a 3 x 3 + + a k 1 x k 1 mod p ;
 Step 3: Output F ( x i ) , x i [ 1 , n ] .

3.4. The General Analysis of the Rational Nature of General Irrationals

Assume that the general irrational number to be transmitted is in the form α × 10 λ . It is known that the type code for the numerator is 10, and the reserved bits are sign ( λ ) | | 00 . . 0 | | bin ( λ ) . If  λ is positive, the sign bit of the reserved field is 0; if negative, it is 1. The sign bit is determined by the sign of α , following the same principle as above. After transmission, if the receiver obtains k or more shares, they can decode the type code to identify the number as a general irrational number, and can then decode the values of α and λ to reconstruct the original secret r.The entire algorithm process is as shown in the Algorithm 4.
Algorithm 4 Secret-sharing for general irrational numbers
Require:  α × 10 λ , r CrQ G
Ensure:  F ( x i ) , x i [ 1 , n ]
  1: Step 1: T 100 W X X X s if λ 0
  2: Step 2: Set a 1 = T , a 0 = α , compute:
  3:  F ( x ) = a 0 + a 1 x + a 2 x 2 + + a k 1 x k 1 mod p
  4: Step 3: return  F ( x i ) x i [ 1 , n ]

3.4.1. Security Analysis

In the case of the SSS, while attempts have been made to attack this, thus far, no efficient solution been found [1,27,28].
Initially, the receiver obtains m shares (where m k ), corresponding to m equations with k unknowns, forming an underdetermined system. To ensure security, k and n should be as large as possible [29]. The entropy of each share determines its safety. If the entropy of the share is high enough, the original secret cannot be deduced even if the attacker gains part of the share.
The solution space has a dimension of k m (number of free variables), with infinitely many polynomials satisfying the conditions. For any guessed a 0 , we can construct a polynomial F ( x ) such that F ( x ) = y i and F ( 0 ) = a 0 . Therefore, all possible a 0 are equally likely candidates and cannot distinguish the true secret.
Thus, fewer than k shares result in an infinitude of solutions that prevent any information about the secret r from being revealed to an attacker (information-theoretic security). This is the core security guarantee of the SSS, which does not rely on computational assumptions but is based on the mathematical properties of polynomial interpolation [29].
For counterfeit attacks targeting data type codes, our scheme embeds the data type code as a secret within polynomials. If an attacker attempts to forge the type code, they must modify the shares ( x i , y i ) . However, such modifications inevitably alter the decrypted secret value, thereby contradicting the attacker’s objective of misleading the receiver. The receiver must validate received shares and discard those that produce evidently erroneous decrypted data to mitigate such attacks.
Regarding random-bit enumeration attacks, while a smaller random-bit space theoretically allows attackers to rapidly enumerate and compromise secrets, our scheme explicitly specifies that the parameter a 1 must be at least 8 bits in length. Additionally, the random padding bits are independent of the type code, rendering such attacks practically infeasible in real-world deployments.

3.4.2. Analysis of Algorithm Time and Space Complexity

Regarding time complexity, our algorithm relies on the Shamir encryption scheme. Consequently, the algorithm’s time complexity may be influenced by functions related to data type classification and type code generation. Based on our defined function for classifying data types into rational numbers, general irrational numbers, special irrational numbers, and commonly used irrational numbers, this function operates in constant time, O ( 1 ) , with negligible impact on the overall algorithm’s time complexity. The function responsible for generating type codes for encrypted data constructs a two-digit type code along with a sign indicator, followed by additional bits based on the specific data type. This type code generation function also operates in constant time, O ( 1 ) , with minimal impact on the overall time complexity. The algorithm’s time complexity is therefore equivalent to that of the Shamir encryption scheme, which is O ( n 2 ) .
Regarding space complexity, the analysis process is similar to that of time complexity. We now analyze the space complexity for the functions responsible for data type classification and type code generation. For the function responsible for classifying data types into different categories (rational numbers, general irrational numbers, special irrational numbers, and commonly used irrational numbers), no additional storage of data is required. Thus, its space complexity is O ( 1 ) . For the type code generation function, the space complexity is determined by the fixed amount of space needed to store the returned type code. Since the size of the type code is predetermined and does not depend on the input, this function also has a space complexity of O ( 1 ) . Both functions have negligible impacts on the overall space complexity of the algorithm. Therefore, the algorithm’s space complexity is equivalent to that of the Shamir encryption scheme, which is O ( k log 2 k ) .

3.4.3. The Trade-Offs Between Algorithm Parameters

Next, we will discuss the trade-offs between the parameters k , p and the thresholds n , k :
  • The parameters k (threshold):
    (a)
    Security: the greater the k value, the higher the security of the system. Because attackers need to obtain a larger share to restore the secret, the risk of secret leakage is reduced. For example, when k is 4, attackers need to obtain at least four shares to recover the secret. Compared with when k is 2, the security has been significantly improved.
    (b)
    Efficiency: The larger the k value, the greater the computational complexity and communication overhead of the secret segmentation and recovery process. In the secret split phase, the polynomial and share computing time complexity are O ( k ) , whereas in the secret recovery phase, the Lagrange interpolation method of time complexity is O ( k 2 ) . Meanwhile, more shares need to be stored and transmitted, which increases the space and communication costs.
    (c)
    Flexibility: A larger k value can offer higher fault tolerance. Even if some shares are lost or damaged, as long as the remaining share quantity reaches k, the secret can still be restored. For example, in a scenario with 10 participants and a threshold of five, even if four shares are lost, the secret can still be recovered.
  • Parameter p (prime numbers in a finite field):
    (a)
    Security: Choosing a larger prime number p can enhance the security of the system, as a larger finite field increases the difficulty of brute-force cracking secrets. For example, when choosing a 256-bit prime number p, compared with choosing a 64-bit prime number p, under the same conditions, the time and computing resources required for brute-force cracking will increase significantly.
    (b)
    Efficiency: A larger p-value will lead to an increase in computational and storage overhead. Operations are carried out in the finite field G F ( p ) , including the generation of polynomials, the calculation of shares, and Lagrange interpolation, etc. The time complexity is proportional to the magnitude of p. Meanwhile, the storage space required for the storage share and polynomial coefficients will also increase as p increases.
  • Parameter n (total share quantity):
    (a)
    Fault tolerance: The larger the value of n, the stronger the fault tolerance of the system. Because there are more shares to choose from, even if some shares are lost or damaged, as long as the remaining share quantity reaches k, the secret can still be restored. For example, in a scenario with 20 shares and a threshold of five, even if 15 shares are lost, the secret can still be recovered.
    (b)
    Efficiency: The larger the value of n, the greater the overhead of secret segmentation and storage. More shares need to be generated and stored, which increases the space and communication costs. Meanwhile, in the secret recovery stage, k shares need to be selected from more shares for interpolation operation, which may increase the computational overhead.
    (c)
    Flexibility: A larger n value can offer greater flexibility. Different numbers of participants can be selected based on actual needs, and the allocation and recovery process of shares can be dynamically adjusted according to the availability of participants.
In practical applications, parameters k , p and n need to be reasonably selected based on specific security requirements, efficiency requirements, fault tolerance capabilities, etc., in order to achieve the best balance between performance and security. For example, in financial transaction scenarios with high security requirements, larger k values and p values can be selected to ensure the security of secrets. In Internet of Things (IoT) devices with high efficiency requirements, smaller k and p values can be selected to reduce computing and communication overhead.

3.4.4. Performance Analysis

Our scheme can realize lossless transmission in rational numbers, common irrational numbers, and special irrational numbers. When the receiver receives the original ciphertext and type code, it can determine the exact type of the original integer received and then restore it. For the general irrational numbers, the secret of eight decimal places can be accurately restored so as to minimize the loss of the original secret.
Our scheme not only minimizes losses during secret recovery but also maintains a high level of security. By incorporating more than half of the random digits in the type code method, we effectively prevent brute-force attacks by adversaries.

4. Experiments and Comparisons

In this section, the experimental data and results demonstrate that the proposed scheme achieves its intended performance by enabling secret sharing of different input data formats. The experiments are conducted using four types of raw ciphertexts and aim to validate the proposed scheme through experimental content including the SS of rational numbers, the SS of general irrational numbers, the SS of common irrational numbers, the SS of special irrational numbers, error rate comparisons, and error analysis.
The experiments were conducted on a Windows 11 system. The implementation was carried out in Python 3.12, leveraging libraries such as openpyxl for data handling. For real numbers, the study primarily distinguished between rational and irrational numbers. Irrational numbers were further categorized into general irrational numbers, common irrational numbers (such as π and e), and special irrational numbers with the aim of enabling lossless transmission. Based on these categorizations, experiments were conducted across the four categories to verify the correctness of the original number generation for both the sender and receiver. The evaluation focused not only on whether the original number could be accurately generated but also on comparing our proposed scheme with existing schemes to highlight its advantages.

4.1. The SS of Rational Numbers

The experimental data range from −10,000 to 10,000, including 1300 rational numbers (both positive and negative), integers, fractions, and decimals with up to twelve decimal places. For example, the number −1741.6714588027 is selected to illustrate the encryption process for a general negative fraction. First, we convert the number into its fractional form: −17,416,714,588,027/10,000,000,000. The numerator and denominator are then encoded separately according to their type codes. Using the SSS, we split the numerator (a0 = 17,416,714,588,027) and the denominator (a1 = 10,000,000,000), where k = 4 and n = 5. We perform the operation as described in Algorithm 1, and thus obtain the secret. Below are the results of this experiment on the 1300 data points as shown in Table 4, Figure 2.
Table 4 summarizes the number of data types along with their corresponding error rates. Figure 2 presents the accuracy changes under different digitization conditions. Based on these observations, we can also derive the following conclusions:
  • For rational numbers, our protocol scheme is error free within a fixed range of numbers, where the length of the number (the maximum number of digits in the numerator or denominator expressed as a fraction) does not affect the error rate. This is because, within a limited number of digits that can be represented by a computer without considering rational number overflow, there is no error inherent in the experimental transmission process.
  • The protocol introduces randomness during the generation of shares, which means that even if two shares correspond to the same secret value, they will appear completely different. This significantly increases the security complexity and ensures that at least k shares are required to reconstruct the original secret. Even if an attacker obtains fewer than k shares, no information about the original secret can be revealed.
  • The SSS is adopted. By adjusting k values, different levels of security protection can be achieved. Specifically, in the example, parameters are set as k = 4 , n = 5 , meaning that the original secret is split into five shares (n = 5), and any combination of four shares is sufficient to reconstruct the original secret. This mechanism allows for flexible threshold settings, enhancing both the security and flexibility of data transmission.

4.2. The SS of General Irrational Numbers

For general irrational numbers, we selected a total of 300 common irrational numbers, including complex radicals such as 4 3 + 1 and 2 2 π , and those with extremely small values in scientific notation (e.g., Planck’s constant h = 6.62607015 × 10 34 ). These numbers have the characteristic that they cannot be precisely represented during transmission and inherently contain errors. In our specific experiment, we retained eight significant digits for sharing. For instance, let us Take 4 π 3 and Planck’s constant h as examples.
Approximating 4 π 3 with eight decimal places resulted in the value 5.85836755, which corresponded to the fraction 117,167,351/20,000,000. We performed the operation as described in Algorithm 1, and thus obtained the secret.
Planck’s constant h (6.62607015 × 10−34) is truncated to 6.6260702 × 10−34 (retaining 8 significant digits from the first non-zero digit). In the reserved bits of the protocol, 8 bits are retained to fill in the binary of 34 (00100010), indicating that there are 34 zeros before the significant digits of this data, and then random bits are filled in to supplement the protocol. The remaining data retains eight significant digits of 6.6260702, which is converted into the fraction 66,260,702/10,000,000, and encrypted according to the operations of Algorithm 1 to obtain the secret information.
The theoretical error bound for 8 significant digits is derived as
ϵ 0.5 × 10 ( m 8 )
where m is the position of the first non-zero digit. For h ( m = 34 ), the error bound is 0.5 × 10 26 , while for 4 π 3 ( m = 1 ), it is 0.5 × 10 8 . This mechanism ensures consistent precision across different orders of magnitude.
Experimental results for 300 test cases (including 50 data points with extremely small values such as physical constants and quantum parameters) show
  • Maximum error: 4.9 × 10 9 for 4 π 3 , 3.1 × 10 27 for h, aligning with theoretical bounds;
  • Average error: 2.5 × 10 9 for large-magnitude irrationals, 1.7 × 10 27 for data with extremely small values, confirming uniform distribution within [ 0   , 0.5 × 10 ( m 8 ) ] .
Through the above data, we can draw the following conclusion:
  • Eight significant digits truncation reduces precision loss by 2–3 orders of magnitude for data with extremely small values compared to decimal truncation;
  • The error rate remains stable at 10 8 to 10 27 across data scales, demonstrating universality;
  • For irrational numbers in general, the protocol achieves a balance between security and effectiveness. In experimental data processing, it also exhibits good robustness and will not lead to erroneous judgments of other types of irrational numbers due to boundary detection or similar reasons.

4.3. The SS of Special Irrational Numbers

For the experiment on special irrational numbers, we selected a total of 200 special irrational numbers to satisfy general conditions. These included decimals, fractions, integers, and negative numbers (if applicable when the root index is odd). For example, 11 524 200 , 4.12913 3253 , and 3243.276 3 were demonstrated. Below, we will demonstrate the secret processes of special irrational numbers using 231 1453 2514 as an example.
For the root index of 2541, when converted to binary, it is represented as 100111101101 over 12 bits. Following the bit-padding selection principle outlined in the previous text, a 16-bit padding field was determined. The type codes are defined as 0100000100111101101 followed by forty-four random bits and ending with 0, and also as 0110000100111101101 followed by forty-four random bits and ending with 0. Perform the operation as described in Algorithm 2, and thus obtain the secret.
Table 5 is the statistical analysis of our experiment on 200 special irrational numbers.
The Figure 3 and Figure 4 demonstrates the relationship between root index digit size and error rate. From the figure, we can draw the following conclusions:
  • For the protocol special irrational numbers do not suffer from bit loss or errors because the scheme transforms a number that cannot be accurately represented by a computer into an integer usable in the SSS. The receiver can then decode the type code to reveal the transformation used by the sender for the original text;
  • Special irrational numbers are padded with random numbers and allocated reasonable digit lengths, ensuring data security and resistance to attacks. By setting the length of random numbers to more than 50 percent of the total type code length, effective protection against interceptors guessing the raw data is achieved;
  • The type code of special irrational numbers includes fixed features such as the “01” characteristic code, third numerator-denominator mark, and final sign bit, ensuring data integrity.

4.4. The SS of Common Irrational Numbers

We selected a total of 28 common irrational numbers, where the numerator is π or e, and the denominator ranges from 1 to 20, including both positive and negative values, such as π 13 and e 3 . For example, we will detail the secret sharing scheme for π 8 .
The type for π 8 is 1101010010001100 and 00110100, where the former indicates that the transmitted value is + π and the latter indicates a positive integer denominator.Perform the operation as described in Algorithm 3, and thus obtain the secret.
Table 6 are the experimental results and error analysis graphs for these 28 data sets:
For common transcendental numbers, there are no errors, as they are known to be transcendental and have been proven to be irrational. We can use specific encodings for π and e, which allows the receiver to decode the shared secret without any issues. This encoding method is relatively simple and efficient, with a total length of 16 bits after adding 11 random bits. By using this approach, we maintain both security and efficiency in the protocol.

4.5. Comparison with Wang’s Scheme

In Wang’s scheme [30], the formula for converting floating-point numbers into integers is used to implement the SSS:
t r a n s ( x ) = ( x + m a x ( | θ | ) ) × 10 U
The larger the value of U, the more decimal places are retained in the parameters, and thus the higher the precision of the reconstructed model parameters. To satisfy the condition that the converted integer range lies within a finite field, U must be chosen such that 2 m a x ( | θ | ) 10 U < P . Furthermore, to maximize U while satisfying this condition, the scheme determines the specific value of U using the following formula:
U = lg P 2 m a x ( | θ | )
We selected 10,000 real numbers of different types, including fractions, finite decimals, recurring decimals, negative numbers, general irrationals, special irrationals, and common irrationals. We performed secret analysis using both Wang’s scheme and our scheme, and tested the sharing accuracy, throughput and transmission delay.
The experimental results are as Table 7. We analyzed the experimental results as follows:
  • Accuracy
    (a)
    Rational Numbers: Both Wang’s scheme and our scheme achieved 100% accuracy for all subtypes of rational numbers, including fractions, recurring decimals, finite decimals, and negative numbers. This indicates that in handling rational-valued data, both schemes can ensure the integrity and correctness of the data without introducing errors.
    (b)
    Irrational numbers: Wang’s scheme is unable to handle irrational numbers, as evidenced by the “N/A” entries for common irrationals, special irrationals, and general irrationals. In contrast, our scheme can handle irrational numbers with high accuracy. It achieves 99.9999995% accuracy for common irrationals and 100% accuracy for special and general irrationals. This showcases the broader applicability of our scheme in dealing with a wider range of real-valued data.
  • Throughput
    (a)
    Rational numbers: For rational numbers, Wang’s scheme generally has a higher throughput than our scheme. For example, for fractions, Wang’s scheme has a throughput of 7329.39 compared to 5663.08 in our scheme. For recurring decimals, the values are 6118.42 and 5337.91, respectively. The only exception is for finite decimals, where our scheme (12,879.99) has a significantly higher throughput than Wang’s scheme (6909.50). This suggests that in most cases of rational number processing, Wang’s scheme can handle data at a faster rate, but our scheme has its own advantage in processing finite decimals.
    (b)
    Irrational numbers: As Wang’s scheme cannot handle irrational numbers, its throughput for these data types is N/A. Our scheme, however, demonstrates good throughput performance for irrational numbers. It has a throughput of 13,779.41 for common irrationals, 13,471.72 for special irrationals, and 10,075.00 for general irrationals. This highlights that our scheme is capable of efficiently processing irrational-valued data, which is a major advantage in scenarios where such data is present.
    Table 7. The comparison with Wang’s scheme.
    Table 7. The comparison with Wang’s scheme.
    Data TypeWang’s SchemeOur Scheme
    Accuracy Throughout Transmission Delay/µs Accuracy Throughout Transmission Delay/µs
    Rational NumbersFraction99.99995%7329.39136100%5663.08177
    Recurring Decimals100%6118.42163100%5337.91187
    Finite Decimals100%6909.50145100%12,879.9978
    Negative Numbers100%5918.05169100%11,112.5891
    Irrational NumbersCommon IrrationalsN/AN/AN/A99.9999995%13,779.4173
    Special IrrationalsN/AN/AN/A100%13,471.7274
    General IrrationalsN/AN/AN/A100%10,075.0099
  • Transmission Delay
    (a)
    Rational numbers: For rational numbers, Wang’s scheme has a lower transmission delay in most cases. For fractions, the delay is 136 µs in Wang’s scheme compared to 177 µs in our scheme. For recurring decimals, the delays are 163 µs and 187 µs, respectively. For negative numbers, Wang’s scheme has a delay of 169 µs, while our scheme has 91 µs. The exception is for finite decimals, where our scheme (78 µs) has a lower delay than Wang’s scheme (145 µs). This shows that Wang’s scheme is generally faster in data transmission for rational numbers, except for finite decimals.
    (b)
    Irrational numbers: Since Wang’s scheme cannot process irrational numbers, its transmission delay for these data types is N/A. Our scheme has a relatively stable transmission delay for irrational numbers, with values of 73 µs for common irrationals, 74 µs for special irrationals, and 99 µs for general irrationals. This indicates that our scheme can handle irrational numbers with a predictable and acceptable level of delay.
  • Overall conclusions
    Wang’s scheme performs well in terms of throughput and transmission delay for most rational numbers, but it lacks the ability to handle irrational numbers. Our Scheme, despite its relatively lower throughput and higher transmission delay for some rational numbers, stands out for its ability to handle both rational and irrational numbers with high accuracy. In applications where data types are diverse and include irrational numbers, such as in scientific computing, advanced financial modeling, and certain healthcare data processing scenarios, our scheme is more suitable. However, in simple rational-number-only applications where speed is a priority, Wang’s scheme may be a better choice. Future improvements to our scheme could focus on optimizing the processing of rational numbers to reduce the performance gap with Wang’s scheme in this aspect while maintaining its strength in handling irrational numbers.

4.6. Comparison with the Traditional SSS Scheme

Traditional Shamir secre-sharing (SSS) is inherently designed for integer-based operations over finite fields. In contrast, our proposed scheme extends its capability to real numbers through type encoding.
Table 8 is a detailed comparative analysis based on experimental data.
Performance Dynamics:
  • Traditional SSS achieves lower latency and higher throughput for rational numbers but cannot handle any irrational data types.
  • Our scheme incurs +28.9% latency and −12.4% throughput for rationals but enables 100% coverage of real numbers, including irrationals.
Reasons for Performance Sacrifice:
  • Our scheme embeds type codes in polynomial coefficients (e.g., a 1 stores the type code), requiring additional computations during share generation and reconstruction. Additionally, rational numbers (e.g., fractions) require both numerator and denominator to be shared as separate integers, doubling the computational load compared to traditional SSS’s single-integer approach.
  • Common irrationals require eight-digit truncation and scaling to integers, adding preprocessing/postprocessing steps absent in traditional SSS; general irrationals such π require reserved bits in type codes, introducing non-trivial encoding/decoding logic.
Impact:
  • In scenarios requiring real-number precision (e.g., financial modeling, quantum systems), our scheme’s applicability outweighs marginal performance losses.
  • Traditional SSS is obsolete in domains where irrational numbers are endemic (e.g., physics, engineering).
The latency and throughput sacrifices in our scheme are deliberate design choices that address a critical gap in traditional SSS: the inability to securely share real numbers. By prioritizing applicability across rational and irrational domains, our approach enables new use cases in fields e.g., financial analytics [31]. While performance optimizations are warranted for specific scenarios, the core trade-off—trading marginal speed for universal numerical support—represents a foundational advancement in secret sharing for the data-driven era.

5. Conclusions

The proposed enhanced scheme significantly advances the traditional secret-sharing scheme (SSS) through the innovative incorporation of type code, thereby expanding its functionality and providing more robust system support. Through comprehensive comparative analysis with existing methodologies, our approach demonstrates superior performance metrics in error prevention, standardization, and security enhancement. Empirical evaluations substantiate that the scheme achieves perfect accuracy in the transmission of rational numbers, special irrational numbers, and common irrational numbers, while maintaining negligible error margins for general irrational numbers. Nevertheless, the proposed methodology is not without limitations. The implementation of type coding introduces additional computational overhead, resulting in increased algorithmic complexity and reduced efficiency during the decryption process. Furthermore, while maintaining stringent security requirements, the type code implementation compromises system simplicity, presenting a trade-off that warrants further investigation. Gao et al.’s parallel color-image encryption algorithm—based on a 2D Logistic–Rulkov neuron map—leverages the map’s chaotic dynamics and multi-core parallelism to greatly accelerate large-scale image encryption while enhancing resistance to attacks [32]. The strong anti-interference capability and fast image encryption method in Gao’s scheme have provided significant inspiration for the subsequent optimization of our scheme. We have drawn insights from Gao et al.’s work as guidance for our future scheme improvements.

Author Contributions

Conceptualization, J.W. and Z.W.; methodology, Z.W.; software, J.W.; validation, J.W., Z.W. and Z.W.; formal analysis, X.Y.; investigation, X.Y.; resources, X.Y.; data curation, Z.W.; writing—original draft preparation, Y.Y.; writing—review and editing, Y.Y.; visualization, Z.W.; supervision, J.W.; project administration, J.W.; funding acquisition, Y.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work is funded by the Program of the National Natural Science Foundation of China (Grant Nos. 62271496).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Jenifer, R.R.; Prakash, V.S.J. Rivest-Shamir-Adleman algorithm optimized to protect iot devices from specific attacks. Inform. Autom. 2024, 23, 1423–1453. [Google Scholar] [CrossRef]
  2. Yang, Z.; Peng, C.; Zhong, C.; Long, Y. Consortium blockchain private key protection scheme based on rational secret sharing and blockchain. Comput. Netw. 2024, 242, 110260. [Google Scholar] [CrossRef]
  3. Wu, C.; Zhang, L.; Xu, L.; Choo, K.K.R.; Zhong, L. Privacy-preserving serverless federated learning scheme for Internet of Things. IEEE Internet Things J. 2024, 11, 22429–22438. [Google Scholar] [CrossRef]
  4. Feng, Q.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. White-box implementation of Shamir’s identity-based signature scheme. IEEE Syst. J. 2019, 14, 1820–1829. [Google Scholar] [CrossRef]
  5. Bansal, G.; Sikdar, B. Achieving Secure and Reliable UAV Authentication: A Shamir’s Secret Sharing Based Approach. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3598–3610. [Google Scholar] [CrossRef]
  6. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  7. Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the Managing Requirements Knowledge, International Workshop, New York, NY, USA, 4–7 June 1979; IEEE Computer Society: Los Alamitos, CA, USA, 1979; p. 313. [Google Scholar]
  8. Salim, S.; Suresh, S.; Gokul, R.; Reshma, S. Application of Shamir Secret Sharing Scheme for Secret Data Hiding and Authentication. Int. J. Adv. Res. Comput. Sci. Technol. 2014, 2, 220–224. [Google Scholar]
  9. Kang, H.; Leng, L.; Kim, B.G. Data hiding of multicompressed images based on Shamir threshold sharing. Appl. Sci. 2022, 12, 9629. [Google Scholar] [CrossRef]
  10. Singh, P.; Raman, B. Reversible data hiding based on Shamir’s secret sharing for color images over cloud. Inf. Sci. 2018, 422, 77–97. [Google Scholar] [CrossRef]
  11. Singh, P.; Raman, B.; Misra, M. Just process me, without knowing me: A secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimed. Tools Appl. 2018, 77, 12581–12605. [Google Scholar] [CrossRef]
  12. Nakkar, M.; AlTawy, R.; Youssef, A. Lightweight group authentication scheme Leveraging Shamir’s secret sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3412–3429. [Google Scholar] [CrossRef]
  13. Tejedor-Romero, M.; Orden, D.; Marsa-Maestre, I.; Junquera-Sanchez, J.; Gimenez-Guzman, J.M. Distributed remote e-voting system based on Shamir’s secret sharing scheme. Electronics 2021, 10, 3075. [Google Scholar] [CrossRef]
  14. Yu, K.; Tan, L.; Yang, C.; Choo, K.K.R.; Bashir, A.K.; Rodrigues, J.J.; Sato, T. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. 2021, 9, 8154–8167. [Google Scholar] [CrossRef]
  15. Hsu, C.; Harn, L.; Xia, Z.; Zhang, M. Non-interactive dealer-free dynamic threshold secret sharing based on standard shamir’s SS for 5G networks. IEEE Access 2020, 8, 203965–203971. [Google Scholar] [CrossRef]
  16. Wang, X.; Shan, H.; Yan, X.; Yu, L.; Yu, Y. A neural network model secret-sharing scheme with multiple weights for progressive recovery. Mathematics 2022, 10, 2231. [Google Scholar] [CrossRef]
  17. Zand, A.; Orwell, J.; Pfluegel, E. A secure framework for anti-money-laundering using machine learning and secret sharing. In Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 15–19 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar]
  18. Aliasgari, M.; Blanton, M.; Bayatbabolghani, F. Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. Int. J. Inf. Secur. 2017, 16, 577–601. [Google Scholar] [CrossRef]
  19. Kamm, L.; Willemson, J. Secure floating point arithmetic and private satellite collision analysis. Int. J. Inf. Secur. 2015, 14, 531–548. [Google Scholar] [CrossRef]
  20. Bogdanov, D.; Niitsoo, M.; Toft, T.; Willemson, J. High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 2012, 11, 403–418. [Google Scholar] [CrossRef]
  21. Bogdanov, D.; Kamm, L.; Laur, S.; Sokk, V. Rmind: A tool for cryptographically secure statistical analysis. IEEE Trans. Dependable Secur. Comput. 2016, 15, 481–495. [Google Scholar] [CrossRef]
  22. Preethi, S.; Priyadharsini, C. Deep Learning with Blockchain Technology for Secure Data Management in Healthcare Sector using Hybrid Elliptic Curve-Rivest-Shamir-Adleman Cryptography. Cybern. Syst. 2022, 55, 1–37. [Google Scholar]
  23. Catrina, O. Evaluation of floating-point arithmetic protocols based on shamir secret sharing. In Proceedings of the E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, 26–28 July 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 108–131. [Google Scholar]
  24. Finamore, T. Shamir’s Secret Sharing Scheme Using Floating Point Arithmetic. Ph.D. Thesis, Florida Atlantic University, Boca Raton, FL, USA, 2012. [Google Scholar]
  25. Gao, S.; Iu, H.H.C.; Erkan, U.; Simsek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D memristive cubic map with dual discrete memristors: Design, implementation, and application in image encryption. IEEE Trans. Circuits Syst. Video Technol. 2025. [Google Scholar] [CrossRef]
  26. Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
  27. Tesoro, M.; Siloi, I.; Jaschke, D.; Magnifico, G.; Montangero, S. Quantum inspired factorization up to 100-bit RSA number in polynomial time. arXiv 2024, arXiv:2410.16355. [Google Scholar] [CrossRef]
  28. Isa, M.; Rahmany, N.; Asbullah, M.; Sathar, M.; Rasedee, A. On the insecurity of generalized (Rivest-Shamir-Adleman)-advance and adaptable cryptosystem. J. Phys. Conf. Ser. 2019, 1366, 012021. [Google Scholar] [CrossRef]
  29. Lemnouar, N. Security limitations of Shamir’s secret sharing. J. Discret. Math. Sci. Cryptogr. 2022, 26, 977–989. [Google Scholar] [CrossRef]
  30. Zhou, C.; Sun, Y.; Wang, D.; Ge, Y. Federal Learning Research Overview. J. Networks Inf. Secur. 2021, 7, 77–92. [Google Scholar]
  31. Jadhao, A.S.; Kumbhalkar, S.B. Technical review on secure banking using RSA and AES encryptor methodologies. IOSR J. Electron. Commun. Eng. 2016, 11, 1–4. [Google Scholar]
  32. Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
Figure 1. Algorithm flowchart.
Figure 1. Algorithm flowchart.
Entropy 27 00769 g001
Figure 2. The accuracy of the rational numbers experiment.
Figure 2. The accuracy of the rational numbers experiment.
Entropy 27 00769 g002
Figure 3. The Impact of Root Index Digit on Experimental Accuracy.
Figure 3. The Impact of Root Index Digit on Experimental Accuracy.
Entropy 27 00769 g003
Figure 4. The Impact of Base Digit on Experimental Accuracy.
Figure 4. The Impact of Base Digit on Experimental Accuracy.
Entropy 27 00769 g004
Table 1. The symbol explanations in the scheme.
Table 1. The symbol explanations in the scheme.
SymbolDescription
Q Rational Number
T Data Type Code
F ( x ) Algorithm-generated Share
CrQ s Special Irrational Number
CrQ p Common Irrational Number
CrQ G General Irrational Number
X Random Bit
s Positive and Negative Identification Bit
W The Reserved Bit
U Precision
Table 4. The results of the rational numbers experiment.
Table 4. The results of the rational numbers experiment.
Data TypesQuantityError Rate
Integer4140%
Fraction4490%
Decimal4370%
Table 5. The Results of the Special Irrational Numbers Experiment.
Table 5. The Results of the Special Irrational Numbers Experiment.
Base345678
Root Index
1000100%100%100%100%100%100%
2000100%100%100%100%100%100%
3000100%100%100%100%100%100%
4000100%100%100%100%100%100%
5000100%100%100%100%100%100%
Table 6. The Results of the Common Irrational Number Experiment.
Table 6. The Results of the Common Irrational Number Experiment.
Common Irrational Numbers π e
Divisor
2–10100%100%
10–19100%100%
20–29100%100%
30–100100%100%
Table 8. The comparison with traditional SSS Scheme.
Table 8. The comparison with traditional SSS Scheme.
Data TypeTraditional SSS SchemeOur Scheme
Accuracy Throughout Transmission Delay/µs Accuracy Throughout Transmission Delay/µs
Rational NumbersFraction100%6466.00155100%5663.08177
Recurring Decimals99.9999995%6278.74159100%5337.91187
Finite Decimals100%13,212.9245100%12,879.9978
Negative Numbers100%18,074.4655100%11,112.5891
Irrational NumbersCommon IrrationalsN/AN/AN/A99.9999995%13,779.4173
Special IrrationalsN/AN/AN/A100%13,471.7274
General IrrationalsN/AN/AN/A100%10,075.0099
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wan, J.; Wang, Z.; Yu, Y.; Yan, X. ApproximateSecret Sharing in Field of Real Numbers. Entropy 2025, 27, 769. https://doi.org/10.3390/e27070769

AMA Style

Wan J, Wang Z, Yu Y, Yan X. ApproximateSecret Sharing in Field of Real Numbers. Entropy. 2025; 27(7):769. https://doi.org/10.3390/e27070769

Chicago/Turabian Style

Wan, Jiaqi, Ziyue Wang, Yongqiang Yu, and Xuehu Yan. 2025. "ApproximateSecret Sharing in Field of Real Numbers" Entropy 27, no. 7: 769. https://doi.org/10.3390/e27070769

APA Style

Wan, J., Wang, Z., Yu, Y., & Yan, X. (2025). ApproximateSecret Sharing in Field of Real Numbers. Entropy, 27(7), 769. https://doi.org/10.3390/e27070769

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop