ApproximateSecret Sharing in Field of Real Numbers
Abstract
1. Introduction
- Decimal scaling methods, which convert secrets to integers for SSS, sacrificing support for irrational numbers altogether. Both approaches fail to address the fundamental challenge of representing irrational numbers precisely, leaving receivers unable to quantify accuracy degradation and introducing data loss in high-precision contexts.
- Bernoulli-distributed random bit injection, which guarantees uniqueness across different encoding instances of the same number, resisting statistical analysis-based brute-force attacks;
- Type code obfuscation, which strategically distributes critical identifiers ) across non-adjacent encoding components, significantly increasing reverse-engineering difficulty;
- Dynamic extension mechanisms for special irrational numbers, which enhance cryptographic resilience through position-variable encoding structures.
2. Preliminary
2.1. Shamir Secret Sharing
- Secret (r): sensitive information that needs to be protected;
- Share (): distribute the multiple data points generated after splitting the secret to different participants;
- Threshold (k): the minimum number of shares required to restore the secrecy;
- n: The total number of generated shares (n ≥ k);
- Finite field, : all operations are carried out in the prime number field.
2.2. Number Classification
- Rational number (): A number of the form , where and . a is the numerator.
- Special irrational number (): An irrational number that can be simplified to a rational form after raising to a power. It is specifically expressible as , whereIf I is even, must hold.
- Common irrational number (): Numbers of the form or , where (e.g., , ). Note: Only strictly or forms are recognized as common irrational numbers. Numbers like or or are classed as general irrational numbers.
- General irrational number (): Numbers satisfying and . Examples include
3. The Proposed Scheme
3.1. Overview
3.2. Algorithm Design
- Real number standardizationIf , its scientific notation representation is given byWe extract the first eight significant digits from a and perform rounding to obtain , satisfyingPerform standardization transformation on secret :
- Type code length determinationThe type code length followsFor special irrational numbers (), is determined by a dynamic extension mechanism. Let the bit-length of radical I beFor general irrational numbers, the determination of also adopts a dynamic expansion mechanism.The dynamic expansion mechanism automatically adjusts the length based on the binary representation length of .The code length parameters for different types are shown in Table 2:
- Encoding Structure DefinitionThe type code follows a strict binary concatenation scheme:
- (a)
- Data type code ():
- (b)
- Component flag ():Among them, if the secret is a general irrational number, then this bit is transformed into a reserved sign bit, which is used to mark the sign of the reserved bit:
- (c)
- Reserved Field (W):
- (d)
- Random Bits ():
- (e)
- Sign Bit (s):
The specific parameter settings are shown in the Table 3. - Case Studies
- (a)
- Special irrational number example:
- Data type: (special irrational)
- Maker bit: (numerator encoding for 2)
- Reserved field (W):
- Final type code structure for numerator:
- (b)
- Common irrational number example:
- Type code: (common irrational)
- Component flag: (numerator )
- Reserved field ( for )
- Final type code for numerator:
- Secret reconstructionWhen k valid shares are received, reconstruct the polynomial using Lagrangian interpolation:
- (a)
- Define basis polynomials:
- (b)
- Reconstruct the polynomial:
- (c)
- Recover secret coefficients:
- Theoretical error bounds and error distribution analysisFor general irrational numbers, analyze the error bounds and error distribution when truncating to eight decimal places.
- (a)
- The theoretical error bound: Suppose x is an irrational number, its true value is x, and the value after truncation to eight decimal places is . Then the truncation error can be expressed asSince it is truncated to eight decimal places, the maximum possible error occurs at the ninth decimal place. Therefore, the theoretical error bound can be expressed asThis is because the maximum error occurs when the ninth digit is five (in the case of rounded boundaries), at which point the error is .
- (b)
- Hypothesis of error distribution: Suppose the truncation error is uniformly distributed within its theoretical error range. That is,This means that the error is uniformly distributed over the interval . This assumption is based on the following considerations:
- i
- Randomness: The decimal part of an irrational number is random, so the truncation error can be regarded as random.
- ii
- Uniform distribution assumption: Since the decimal parts of irrational numbers exhibit no regularity, it is reasonable to assume that truncation errors will arise within the error bounds predicted by uniform distribution theory.
- (c)
- Experimental verification. The experimental results mentioned in the paper show that the actual error is usually on the order of , which is consistent with the theoretical error bound and error distribution assumptions. Specifically,
- i
- Maximum error: The maximum error observed in the experiment is close to , which is consistent with the theoretical error bound.
- ii
- Average error: As the error is uniformly distributed within , the average error is approximately .
Through theoretical analysis and experimental verification, we can draw the following conclusions:- i
- Theoretical error bound: For an ordinary irrational number truncated to eight decimal places, its theoretical error bound is .
- ii
- The error distribution hypothesis: There will be truncation errors in uniform distribution. This is a reasonable and acceptable assumption, and this was also confirmed in the experiment.
3.3. General Analysis
3.3.1. Rational and General Irrational Numbers: General Proof
Algorithm 1 Secret-sharing encryption algorithm for rational numbers |
Require: Ensure: where 1: Step 1: Convert r to form, where and 2: Step 2: For , set and . Substitute this into the polynomial 3: Step 3: Output where |
3.3.2. General Proof for Special Irrational Numbers
Algorithm 2 Secret-sharing encryption algorithm for special irrational numbers |
Require: Ensure: where 1: Step 1: 2: Step 2: Assign type codes: 3: (numerator), 4: (denominator) 5: Step 3: For numerator a, set coefficients: 6: . Construct polynomial: 7: Step 4: Output shares , |
- Type code structure embeds radical degree I in binary form (W).
- Header bits 01 identify special irrationals.
- Third-bit differentiation: 0 for numerator, 1 for denominator.
3.3.3. A General Analysis of the Rational Nature of Common Irrationals
Algorithm 3 The secret-sharing encryption algorithm for common irrationals |
Input: ; Output: , ; Step 1: ,; Step 2: For v, set and , substitute into ; Step 3: Output , |
3.4. The General Analysis of the Rational Nature of General Irrationals
Algorithm 4 Secret-sharing for general irrational numbers |
Require: , Ensure: , 1: Step 1: if 2: Step 2: Set , , compute: 3: 4: Step 3: return |
3.4.1. Security Analysis
3.4.2. Analysis of Algorithm Time and Space Complexity
3.4.3. The Trade-Offs Between Algorithm Parameters
- The parameters k (threshold):
- (a)
- Security: the greater the k value, the higher the security of the system. Because attackers need to obtain a larger share to restore the secret, the risk of secret leakage is reduced. For example, when k is 4, attackers need to obtain at least four shares to recover the secret. Compared with when k is 2, the security has been significantly improved.
- (b)
- Efficiency: The larger the k value, the greater the computational complexity and communication overhead of the secret segmentation and recovery process. In the secret split phase, the polynomial and share computing time complexity are , whereas in the secret recovery phase, the Lagrange interpolation method of time complexity is . Meanwhile, more shares need to be stored and transmitted, which increases the space and communication costs.
- (c)
- Flexibility: A larger k value can offer higher fault tolerance. Even if some shares are lost or damaged, as long as the remaining share quantity reaches k, the secret can still be restored. For example, in a scenario with 10 participants and a threshold of five, even if four shares are lost, the secret can still be recovered.
- Parameter p (prime numbers in a finite field):
- (a)
- Security: Choosing a larger prime number p can enhance the security of the system, as a larger finite field increases the difficulty of brute-force cracking secrets. For example, when choosing a 256-bit prime number p, compared with choosing a 64-bit prime number p, under the same conditions, the time and computing resources required for brute-force cracking will increase significantly.
- (b)
- Efficiency: A larger p-value will lead to an increase in computational and storage overhead. Operations are carried out in the finite field , including the generation of polynomials, the calculation of shares, and Lagrange interpolation, etc. The time complexity is proportional to the magnitude of p. Meanwhile, the storage space required for the storage share and polynomial coefficients will also increase as p increases.
- Parameter n (total share quantity):
- (a)
- Fault tolerance: The larger the value of n, the stronger the fault tolerance of the system. Because there are more shares to choose from, even if some shares are lost or damaged, as long as the remaining share quantity reaches k, the secret can still be restored. For example, in a scenario with 20 shares and a threshold of five, even if 15 shares are lost, the secret can still be recovered.
- (b)
- Efficiency: The larger the value of n, the greater the overhead of secret segmentation and storage. More shares need to be generated and stored, which increases the space and communication costs. Meanwhile, in the secret recovery stage, k shares need to be selected from more shares for interpolation operation, which may increase the computational overhead.
- (c)
- Flexibility: A larger n value can offer greater flexibility. Different numbers of participants can be selected based on actual needs, and the allocation and recovery process of shares can be dynamically adjusted according to the availability of participants.
3.4.4. Performance Analysis
4. Experiments and Comparisons
4.1. The SS of Rational Numbers
- For rational numbers, our protocol scheme is error free within a fixed range of numbers, where the length of the number (the maximum number of digits in the numerator or denominator expressed as a fraction) does not affect the error rate. This is because, within a limited number of digits that can be represented by a computer without considering rational number overflow, there is no error inherent in the experimental transmission process.
- The protocol introduces randomness during the generation of shares, which means that even if two shares correspond to the same secret value, they will appear completely different. This significantly increases the security complexity and ensures that at least k shares are required to reconstruct the original secret. Even if an attacker obtains fewer than k shares, no information about the original secret can be revealed.
- The SSS is adopted. By adjusting k values, different levels of security protection can be achieved. Specifically, in the example, parameters are set as , , meaning that the original secret is split into five shares (n = 5), and any combination of four shares is sufficient to reconstruct the original secret. This mechanism allows for flexible threshold settings, enhancing both the security and flexibility of data transmission.
4.2. The SS of General Irrational Numbers
- Maximum error: for , for h, aligning with theoretical bounds;
- Average error: for large-magnitude irrationals, for data with extremely small values, confirming uniform distribution within .
- Eight significant digits truncation reduces precision loss by 2–3 orders of magnitude for data with extremely small values compared to decimal truncation;
- The error rate remains stable at to across data scales, demonstrating universality;
- For irrational numbers in general, the protocol achieves a balance between security and effectiveness. In experimental data processing, it also exhibits good robustness and will not lead to erroneous judgments of other types of irrational numbers due to boundary detection or similar reasons.
4.3. The SS of Special Irrational Numbers
- For the protocol special irrational numbers do not suffer from bit loss or errors because the scheme transforms a number that cannot be accurately represented by a computer into an integer usable in the SSS. The receiver can then decode the type code to reveal the transformation used by the sender for the original text;
- Special irrational numbers are padded with random numbers and allocated reasonable digit lengths, ensuring data security and resistance to attacks. By setting the length of random numbers to more than 50 percent of the total type code length, effective protection against interceptors guessing the raw data is achieved;
- The type code of special irrational numbers includes fixed features such as the “01” characteristic code, third numerator-denominator mark, and final sign bit, ensuring data integrity.
4.4. The SS of Common Irrational Numbers
4.5. Comparison with Wang’s Scheme
- Accuracy
- (a)
- Rational Numbers: Both Wang’s scheme and our scheme achieved 100% accuracy for all subtypes of rational numbers, including fractions, recurring decimals, finite decimals, and negative numbers. This indicates that in handling rational-valued data, both schemes can ensure the integrity and correctness of the data without introducing errors.
- (b)
- Irrational numbers: Wang’s scheme is unable to handle irrational numbers, as evidenced by the “N/A” entries for common irrationals, special irrationals, and general irrationals. In contrast, our scheme can handle irrational numbers with high accuracy. It achieves 99.9999995% accuracy for common irrationals and 100% accuracy for special and general irrationals. This showcases the broader applicability of our scheme in dealing with a wider range of real-valued data.
- Throughput
- (a)
- Rational numbers: For rational numbers, Wang’s scheme generally has a higher throughput than our scheme. For example, for fractions, Wang’s scheme has a throughput of 7329.39 compared to 5663.08 in our scheme. For recurring decimals, the values are 6118.42 and 5337.91, respectively. The only exception is for finite decimals, where our scheme (12,879.99) has a significantly higher throughput than Wang’s scheme (6909.50). This suggests that in most cases of rational number processing, Wang’s scheme can handle data at a faster rate, but our scheme has its own advantage in processing finite decimals.
- (b)
- Irrational numbers: As Wang’s scheme cannot handle irrational numbers, its throughput for these data types is N/A. Our scheme, however, demonstrates good throughput performance for irrational numbers. It has a throughput of 13,779.41 for common irrationals, 13,471.72 for special irrationals, and 10,075.00 for general irrationals. This highlights that our scheme is capable of efficiently processing irrational-valued data, which is a major advantage in scenarios where such data is present.Table 7. The comparison with Wang’s scheme.
Data Type Wang’s Scheme Our Scheme Accuracy Throughout Transmission Delay/µs Accuracy Throughout Transmission Delay/µs Rational Numbers Fraction 99.99995% 7329.39 136 100% 5663.08 177 Recurring Decimals 100% 6118.42 163 100% 5337.91 187 Finite Decimals 100% 6909.50 145 100% 12,879.99 78 Negative Numbers 100% 5918.05 169 100% 11,112.58 91 Irrational Numbers Common Irrationals N/A N/A N/A 99.9999995% 13,779.41 73 Special Irrationals N/A N/A N/A 100% 13,471.72 74 General Irrationals N/A N/A N/A 100% 10,075.00 99
- Transmission Delay
- (a)
- Rational numbers: For rational numbers, Wang’s scheme has a lower transmission delay in most cases. For fractions, the delay is 136 µs in Wang’s scheme compared to 177 µs in our scheme. For recurring decimals, the delays are 163 µs and 187 µs, respectively. For negative numbers, Wang’s scheme has a delay of 169 µs, while our scheme has 91 µs. The exception is for finite decimals, where our scheme (78 µs) has a lower delay than Wang’s scheme (145 µs). This shows that Wang’s scheme is generally faster in data transmission for rational numbers, except for finite decimals.
- (b)
- Irrational numbers: Since Wang’s scheme cannot process irrational numbers, its transmission delay for these data types is N/A. Our scheme has a relatively stable transmission delay for irrational numbers, with values of 73 µs for common irrationals, 74 µs for special irrationals, and 99 µs for general irrationals. This indicates that our scheme can handle irrational numbers with a predictable and acceptable level of delay.
- Overall conclusionsWang’s scheme performs well in terms of throughput and transmission delay for most rational numbers, but it lacks the ability to handle irrational numbers. Our Scheme, despite its relatively lower throughput and higher transmission delay for some rational numbers, stands out for its ability to handle both rational and irrational numbers with high accuracy. In applications where data types are diverse and include irrational numbers, such as in scientific computing, advanced financial modeling, and certain healthcare data processing scenarios, our scheme is more suitable. However, in simple rational-number-only applications where speed is a priority, Wang’s scheme may be a better choice. Future improvements to our scheme could focus on optimizing the processing of rational numbers to reduce the performance gap with Wang’s scheme in this aspect while maintaining its strength in handling irrational numbers.
4.6. Comparison with the Traditional SSS Scheme
- Traditional SSS achieves lower latency and higher throughput for rational numbers but cannot handle any irrational data types.
- Our scheme incurs +28.9% latency and −12.4% throughput for rationals but enables 100% coverage of real numbers, including irrationals.
- Our scheme embeds type codes in polynomial coefficients (e.g., stores the type code), requiring additional computations during share generation and reconstruction. Additionally, rational numbers (e.g., fractions) require both numerator and denominator to be shared as separate integers, doubling the computational load compared to traditional SSS’s single-integer approach.
- Common irrationals require eight-digit truncation and scaling to integers, adding preprocessing/postprocessing steps absent in traditional SSS; general irrationals such require reserved bits in type codes, introducing non-trivial encoding/decoding logic.
- In scenarios requiring real-number precision (e.g., financial modeling, quantum systems), our scheme’s applicability outweighs marginal performance losses.
- Traditional SSS is obsolete in domains where irrational numbers are endemic (e.g., physics, engineering).
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Jenifer, R.R.; Prakash, V.S.J. Rivest-Shamir-Adleman algorithm optimized to protect iot devices from specific attacks. Inform. Autom. 2024, 23, 1423–1453. [Google Scholar] [CrossRef]
- Yang, Z.; Peng, C.; Zhong, C.; Long, Y. Consortium blockchain private key protection scheme based on rational secret sharing and blockchain. Comput. Netw. 2024, 242, 110260. [Google Scholar] [CrossRef]
- Wu, C.; Zhang, L.; Xu, L.; Choo, K.K.R.; Zhong, L. Privacy-preserving serverless federated learning scheme for Internet of Things. IEEE Internet Things J. 2024, 11, 22429–22438. [Google Scholar] [CrossRef]
- Feng, Q.; He, D.; Wang, H.; Kumar, N.; Choo, K.K.R. White-box implementation of Shamir’s identity-based signature scheme. IEEE Syst. J. 2019, 14, 1820–1829. [Google Scholar] [CrossRef]
- Bansal, G.; Sikdar, B. Achieving Secure and Reliable UAV Authentication: A Shamir’s Secret Sharing Based Approach. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3598–3610. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Blakley, G.R. Safeguarding cryptographic keys. In Proceedings of the Managing Requirements Knowledge, International Workshop, New York, NY, USA, 4–7 June 1979; IEEE Computer Society: Los Alamitos, CA, USA, 1979; p. 313. [Google Scholar]
- Salim, S.; Suresh, S.; Gokul, R.; Reshma, S. Application of Shamir Secret Sharing Scheme for Secret Data Hiding and Authentication. Int. J. Adv. Res. Comput. Sci. Technol. 2014, 2, 220–224. [Google Scholar]
- Kang, H.; Leng, L.; Kim, B.G. Data hiding of multicompressed images based on Shamir threshold sharing. Appl. Sci. 2022, 12, 9629. [Google Scholar] [CrossRef]
- Singh, P.; Raman, B. Reversible data hiding based on Shamir’s secret sharing for color images over cloud. Inf. Sci. 2018, 422, 77–97. [Google Scholar] [CrossRef]
- Singh, P.; Raman, B.; Misra, M. Just process me, without knowing me: A secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimed. Tools Appl. 2018, 77, 12581–12605. [Google Scholar] [CrossRef]
- Nakkar, M.; AlTawy, R.; Youssef, A. Lightweight group authentication scheme Leveraging Shamir’s secret sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 2024, 11, 3412–3429. [Google Scholar] [CrossRef]
- Tejedor-Romero, M.; Orden, D.; Marsa-Maestre, I.; Junquera-Sanchez, J.; Gimenez-Guzman, J.M. Distributed remote e-voting system based on Shamir’s secret sharing scheme. Electronics 2021, 10, 3075. [Google Scholar] [CrossRef]
- Yu, K.; Tan, L.; Yang, C.; Choo, K.K.R.; Bashir, A.K.; Rodrigues, J.J.; Sato, T. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. 2021, 9, 8154–8167. [Google Scholar] [CrossRef]
- Hsu, C.; Harn, L.; Xia, Z.; Zhang, M. Non-interactive dealer-free dynamic threshold secret sharing based on standard shamir’s SS for 5G networks. IEEE Access 2020, 8, 203965–203971. [Google Scholar] [CrossRef]
- Wang, X.; Shan, H.; Yan, X.; Yu, L.; Yu, Y. A neural network model secret-sharing scheme with multiple weights for progressive recovery. Mathematics 2022, 10, 2231. [Google Scholar] [CrossRef]
- Zand, A.; Orwell, J.; Pfluegel, E. A secure framework for anti-money-laundering using machine learning and secret sharing. In Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 15–19 June 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–7. [Google Scholar]
- Aliasgari, M.; Blanton, M.; Bayatbabolghani, F. Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. Int. J. Inf. Secur. 2017, 16, 577–601. [Google Scholar] [CrossRef]
- Kamm, L.; Willemson, J. Secure floating point arithmetic and private satellite collision analysis. Int. J. Inf. Secur. 2015, 14, 531–548. [Google Scholar] [CrossRef]
- Bogdanov, D.; Niitsoo, M.; Toft, T.; Willemson, J. High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 2012, 11, 403–418. [Google Scholar] [CrossRef]
- Bogdanov, D.; Kamm, L.; Laur, S.; Sokk, V. Rmind: A tool for cryptographically secure statistical analysis. IEEE Trans. Dependable Secur. Comput. 2016, 15, 481–495. [Google Scholar] [CrossRef]
- Preethi, S.; Priyadharsini, C. Deep Learning with Blockchain Technology for Secure Data Management in Healthcare Sector using Hybrid Elliptic Curve-Rivest-Shamir-Adleman Cryptography. Cybern. Syst. 2022, 55, 1–37. [Google Scholar]
- Catrina, O. Evaluation of floating-point arithmetic protocols based on shamir secret sharing. In Proceedings of the E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, 26–28 July 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 108–131. [Google Scholar]
- Finamore, T. Shamir’s Secret Sharing Scheme Using Floating Point Arithmetic. Ph.D. Thesis, Florida Atlantic University, Boca Raton, FL, USA, 2012. [Google Scholar]
- Gao, S.; Iu, H.H.C.; Erkan, U.; Simsek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D memristive cubic map with dual discrete memristors: Design, implementation, and application in image encryption. IEEE Trans. Circuits Syst. Video Technol. 2025. [Google Scholar] [CrossRef]
- Lin, Y.; Xie, Z.; Chen, T.; Cheng, X.; Wen, H. Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics. Expert Syst. Appl. 2024, 257, 124891. [Google Scholar] [CrossRef]
- Tesoro, M.; Siloi, I.; Jaschke, D.; Magnifico, G.; Montangero, S. Quantum inspired factorization up to 100-bit RSA number in polynomial time. arXiv 2024, arXiv:2410.16355. [Google Scholar] [CrossRef]
- Isa, M.; Rahmany, N.; Asbullah, M.; Sathar, M.; Rasedee, A. On the insecurity of generalized (Rivest-Shamir-Adleman)-advance and adaptable cryptosystem. J. Phys. Conf. Ser. 2019, 1366, 012021. [Google Scholar] [CrossRef]
- Lemnouar, N. Security limitations of Shamir’s secret sharing. J. Discret. Math. Sci. Cryptogr. 2022, 26, 977–989. [Google Scholar] [CrossRef]
- Zhou, C.; Sun, Y.; Wang, D.; Ge, Y. Federal Learning Research Overview. J. Networks Inf. Secur. 2021, 7, 77–92. [Google Scholar]
- Jadhao, A.S.; Kumbhalkar, S.B. Technical review on secure banking using RSA and AES encryptor methodologies. IOSR J. Electron. Commun. Eng. 2016, 11, 1–4. [Google Scholar]
- Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
Symbol | Description |
---|---|
Rational Number | |
Data Type Code | |
Algorithm-generated Share | |
Special Irrational Number | |
Common Irrational Number | |
General Irrational Number | |
Random Bit | |
Positive and Negative Identification Bit | |
The Reserved Bit | |
Precision |
Data Types | Quantity | Error Rate |
---|---|---|
Integer | 414 | 0% |
Fraction | 449 | 0% |
Decimal | 437 | 0% |
Base | 3 | 4 | 5 | 6 | 7 | 8 | |
---|---|---|---|---|---|---|---|
Root Index | |||||||
1000 | 100% | 100% | 100% | 100% | 100% | 100% | |
2000 | 100% | 100% | 100% | 100% | 100% | 100% | |
3000 | 100% | 100% | 100% | 100% | 100% | 100% | |
4000 | 100% | 100% | 100% | 100% | 100% | 100% | |
5000 | 100% | 100% | 100% | 100% | 100% | 100% |
Common Irrational Numbers | e | ||
---|---|---|---|
Divisor | |||
2–10 | 100% | 100% | |
10–19 | 100% | 100% | |
20–29 | 100% | 100% | |
30–100 | 100% | 100% |
Data Type | Traditional SSS Scheme | Our Scheme | |||||
---|---|---|---|---|---|---|---|
Accuracy | Throughout | Transmission Delay/µs | Accuracy | Throughout | Transmission Delay/µs | ||
Rational Numbers | Fraction | 100% | 6466.00 | 155 | 100% | 5663.08 | 177 |
Recurring Decimals | 99.9999995% | 6278.74 | 159 | 100% | 5337.91 | 187 | |
Finite Decimals | 100% | 13,212.92 | 45 | 100% | 12,879.99 | 78 | |
Negative Numbers | 100% | 18,074.46 | 55 | 100% | 11,112.58 | 91 | |
Irrational Numbers | Common Irrationals | N/A | N/A | N/A | 99.9999995% | 13,779.41 | 73 |
Special Irrationals | N/A | N/A | N/A | 100% | 13,471.72 | 74 | |
General Irrationals | N/A | N/A | N/A | 100% | 10,075.00 | 99 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wan, J.; Wang, Z.; Yu, Y.; Yan, X. ApproximateSecret Sharing in Field of Real Numbers. Entropy 2025, 27, 769. https://doi.org/10.3390/e27070769
Wan J, Wang Z, Yu Y, Yan X. ApproximateSecret Sharing in Field of Real Numbers. Entropy. 2025; 27(7):769. https://doi.org/10.3390/e27070769
Chicago/Turabian StyleWan, Jiaqi, Ziyue Wang, Yongqiang Yu, and Xuehu Yan. 2025. "ApproximateSecret Sharing in Field of Real Numbers" Entropy 27, no. 7: 769. https://doi.org/10.3390/e27070769
APA StyleWan, J., Wang, Z., Yu, Y., & Yan, X. (2025). ApproximateSecret Sharing in Field of Real Numbers. Entropy, 27(7), 769. https://doi.org/10.3390/e27070769