Next Article in Journal
Emotion Recognition in Autistic Children Through Facial Expressions Using Advanced Deep Learning Architectures
Previous Article in Journal
A Trust Score-Based Access Control Model for Zero Trust Architecture: Design, Sensitivity Analysis, and Real-World Performance Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of a Secret Sharing Scheme with Mandatory Subgroup Participation

by
Nursulu Kapalova
1,
Dilmukhanbet Dyusenbayev
1,
Ardabek Khompysh
1,2,* and
Kunbolat Algazy
1
1
Institute of Information and Computational Technologies, Almaty 050010, Kazakhstan
2
Faculty of Languages and Humanities, Egyptian University of Islamic Culture Nur-Mubarak, Almaty 050016, Kazakhstan
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(17), 9550; https://doi.org/10.3390/app15179550
Submission received: 10 July 2025 / Revised: 25 August 2025 / Accepted: 28 August 2025 / Published: 30 August 2025

Abstract

This paper proposes an approach based on a secret sharing scheme with the mandatory participation of predefined subgroups. The proposed scheme allows secret reconstruction only when representatives from each designated group of participants (e.g., cloud providers, legally independent parties, etc.) are present. This mechanism enhances resistance to internal collusion, strengthens access control, and enables distributed management. The structure and mathematical foundations of the proposed scheme are presented, along with an analysis of its properties. A cryptanalysis is conducted, evaluating the scheme’s resilience to various types of attacks, and the results are discussed. The computational complexity of the algorithm is also analyzed, and its resource efficiency is confirmed.

1. Introduction

In the context of the widespread use of distributed computing and cloud infrastructures for storing and protecting confidential information, secret sharing schemes play a crucial role in ensuring reliable and fault-tolerant access to data [1,2]. The most common solutions are classical threshold schemes (e.g., Shamir’s scheme), which allow the secret to be reconstructed from any subset of k out of n participants. These schemes enable the distribution of confidential information among multiple parties without storing it in full at a single location, significantly enhancing data security [3,4].
Secret sharing schemes make it possible to divide confidential information Q into n parts and distribute them among n participants. To reconstruct the original secret, it is sufficient to have any k of them. A scheme of this type is also referred to as an ( k , n )—threshold secret sharing scheme [5,6].
Currently, the most widely used methods include Shamir’s scheme as well as the schemes of Mignotte, Asmuth–Bloom, and others. A distinctive feature of the Mignotte and Asmuth–Bloom schemes is the use of the Chinese Remainder Theorem (CRT) in the secret sharing process [7]. The CRT allows the reconstruction of a numerical value from its representation in a system of residues with pairwise coprime moduli. This provides the mathematical and algorithmic foundation for secret reconstruction schemes. However, the Asmuth–Bloom and Mignotte schemes impose significant constraints on the secret—value Q . In the first case, it is limited to the set Z p 0 , while in the second case, the range of possible values is substantially reduced due to the exclusion of a sufficiently large interval of numbers.
Shamir’s secret sharing scheme was first introduced by Adi Shamir in 1979 in his paper How to Share a Secret [8]. This work described an ( k , n ) threshold scheme that allows reconstruction of the secret from any k out of n parts. The scheme relies on the Lagrange interpolation polynomial, which makes it possible to reconstruct the original secret when k valid shares are available [9,10].
Advantages of Shamir’s Scheme:
  • Good scalability. The number of participants can be increased to a value comparable to the size of the finite field p , while the minimum number of shares required to reconstruct the secret remains unchanged.
  • Perfect distribution. Each share (also referred to as a “shadow”) has the same size as the original secret, making the scheme efficient in terms of data volume.
  • Flexibility and renewability. New shares can be generated for the same secret using a different polynomial. This reduces the risk of compromise, as leaked old shares cannot be used unless they originate from the same polynomial.
  • Cryptographic strength. If an adversary possesses fewer than k shares, they cannot reconstruct even a single bit of the secret. This level of security is mathematically proven.
Disadvantages of Shamir’s Scheme:
  • Dependence on a trusted dealer. The basic implementation assumes that the central trusted party (the dealer) correctly generates and distributes the shares. If the dealer is untrustworthy, they may provide incorrect values, making it impossible to reconstruct the secret.
  • Risk of sabotage by the dealer. A malicious or unreliable dealer can intentionally distort the data, disrupt the scheme’s integrity, and even cause complete failure.
In [11], the secret sharing problem is considered from an information-theoretic perspective. The authors propose a method in which only specific participants can reconstruct the secret. They also explore information security techniques in the presence of noise in communication channels used to transmit the shares.
In [12], a time-based secret sharing scheme is introduced. The authors examine approaches for ensuring information-theoretic security by applying temporal constraints.
In [13], a threshold secret sharing scheme based on the Chinese Remainder Theorem is proposed. It is shown to efficiently detect errors and even reveal intentional tampering.
The authors of [14] developed an efficient and reliable threshold scheme for sharing multiple secrets using modern cryptographic tools based on elliptic curves and bilinear pairings.
In [15], the Asmuth–Bloom scheme and its modification are examined. The modified version uses fractal geometry as the encoding function. A numerical method for computing shares is also proposed, enabling simultaneous splitting and encoding of images without the need for additional algorithms, thus avoiding increased computational complexity.
A new threshold scheme based on lattices is described in [16], with its distinguishing feature being the ability for participants to verify the correctness of their received shares. The security of the scheme relies on the computational hardness of lattice problems.
In [17], an encryption algorithm for color images based on the two-dimensional Logistic–Rulkov Neural Map (2D-LRNM) is presented. It is designed to ensure efficient and secure image transmission, particularly in the context of social networks. The algorithm provides separate processing of the three-color channels, incorporates inter-channel interaction, and employs a block-based parallel encryption scheme. The key stream is generated using the 2D-LRNM, which exhibits strong chaotic properties. Experimental results demonstrate a high level of cryptographic security of the proposed approach, as well as a significant reduction in computation time.
The proposed approach has found application in the generation of personal cryptographic keys used in biometric authentication systems and public key infrastructures, where the scheme supports multi-user authorization with the help of cryptographic hardware modules.
However, such schemes assume the homogeneity of participants and do not account for their functional or organizational affiliation. This makes classical schemes vulnerable in situations where
  • All participants belong to the same subgroup (e.g., the same department or one side of a conflict of interest);
  • Collusion is possible within a single group;
  • Strict adherence to principles of role-based access control or regulatory compliance is required (e.g., dual control, the four-eyes principle, or zero trust policies).
Thus, a contradiction arises: on the one hand, joint access to a resource is required, but on the other hand, it must be ensured that access is granted only with the participation of representatives from different groups with distinct roles and trust levels.
To address these limitations, we propose a secret sharing scheme with mandatory participation of representatives from each subgroup. In this scheme, participants are pre-assigned to logical groups based on roles or trust boundaries, and the secret can only be reconstructed if at least one representative from each subgroup is involved.
In this study, the main mathematical quantities and their notations were used. They are summarized in Table 1.

2. Materials and Methods

To enable secure distributed storage, a cryptographic secret sharing approach is employed. Confidential data is divided into several shares, which are stored in independent cloud repositories. The original information can be reconstructed only by combining a sufficient number of shares, ensuring both fault tolerance and protection against unauthorized access (see Figure 1).
The core idea of this approach is that no single share contains enough information to reconstruct the original biometric data (templates). Full recovery of the secret is only possible by combining a predefined number of shares, referred to as the threshold value. This provides a high level of security, particularly in distributed data storage and processing infrastructures.
A wide range of secret sharing schemes has been developed to implement these mechanisms, each with its own characteristics, advantages, and limitations. When choosing the optimal solution, special attention should be paid to efficiency: the scheme must ensure a high level of confidentiality while minimizing computational and memory costs.
The key criteria influencing these parameters are as follows:
  • Perfection—ensures that if fewer than the threshold number of participants (less than k ) collaborate, no information about the secret can be obtained. This guarantees the highest level of confidentiality.
  • Ideality—means that the size of each share is equal to the size of the original secret. Such a scheme avoids additional memory overhead and is efficient in terms of storage.
  • Resource intensity—refers to the amount of memory required for storing and processing the data, including the shares and any auxiliary information. The lower the required memory, the more efficient the scheme.
  • Algorithmic complexity—reflects the computational load on the system when generating shares and reconstructing the secret. Efficient schemes minimize the number of operations, which is particularly important for systems with limited computational capacity.

2.1. Lagrange Interpolation Polynomial

Experimental data often consist of a set of points describing the behavior of a measured signal over time or with respect to another variable. For theoretical analysis of such data, it is necessary to construct an approximating function that connects discrete values with a continuous representation—an interpolation polynomial of degree n . One of the most widely used methods is Lagrange interpolation. The Lagrange interpolation polynomial (LIP) is a polynomial of degree n that passes through all the given data points. These points may be obtained either experimentally or through random sampling at different time moments. The time intervals between the points may be uneven.
The general form of the Lagrange interpolation polynomial of degree n is given by the formula:
L x = i = 0 n f ( x i ) · l i x
where n is the degree of the polynomial L x , f x i is the value of the interpolated function f x at the interpolation node x i , l i x are the Lagrange basis polynomials, defined as follows:
l i x = j = 0 , j i n x x j x i x j = x x 0 x i x 0 x x i 1 x i x i 1 · x x i + 1 x i x i + 1 x x n x i x n
Each basis polynomial equals zero at all interpolation nodes except x i , where it is equal to one. The main advantage of the Lagrange form is that it explicitly expresses the values of the interpolated function at the specified points, which is especially convenient when function values change while the nodes remain fixed. Moreover, the number of arithmetic operations required to construct the Lagrange polynomial is on the order of n 2 , making it one of the most efficient among known analytical representations of interpolation polynomials [9,18].

2.2. Chinese Remainder Theorem

The Chinese Remainder Theorem (CRT) is a fundamental result in number theory that makes it possible to solve systems of congruences with pairwise coprime moduli. It is widely used in cryptography, computational algorithms, coding theory, secret sharing schemes, and other fields [19,20].
Let p 0 , p 1 , , p k 1 be pairwise coprime natural numbers, and a 0 , a 1 , , a k 1 be some integers. Then there exists a unique (within a fixed modulus) integer Q that satisfies the following system of congruences:
Q a 0 m o d p 0                       Q a 1 m o d p 1                             Q a k 1 m o d p k 1      
Furthermore, any two solutions A and B of this system are congruent to each other modulo the product of all moduli:
A B m o d p 0 · p 1 · · p k 1
in other words, the solution to the system of congruences is unique modulo p 0 · p 1 · · p k 1 .
Let us introduce the following notation:
P = p 0 · p 1 · · p k 1 ; P i = P p i is the quotient of the total modulus divided by the corresponding modulus p i ;
N i   denotes the multiplicative inverse of P i   modulo P i , which means:
N i · P i 1 m o d   p i ,   i = 0 , k 1 ¯ .
Then the general solution Q can be explicitly represented by:
Q = a 0 N 0 P 0 + a 1 N 1 P 1 + + a k 1 N k 1 P k 1 .
This formula makes it possible to efficiently compute the solution of the system of congruences and is frequently used in practice in cryptographic algorithms.

3. Results

3.1. Proposed Secret Sharing Scheme with Mandatory Subgroup Participation

This study proposes a secret sharing scheme based on a combination of traditional methods and enhanced to increase the level of information—theoretic security. At the same time, the scheme is designed to perform its main function—reliably partitioning confidential information into multiple shares and allowing its reconstruction only by a specified group of participants.
The main feature of the proposed scheme lies in combining two methods—the Lagrange interpolation form and the Chinese remainder theorem. Next, we will describe the algorithm in more detail.

3.1.1. Secret Distribution

We consider n to be the total number of participants and k to be the number of participants required to reconstruct the secret. As in other similar algorithms, any k participants can successfully reconstruct the secret, while a group with fewer participants cannot do so. The condition 2 k n must be satisfied, as it is essential for the correctness of the scheme. The inequality k 2 guarantees the requirement of collective participation and excludes the possibility of unilateral secret reconstruction. The condition k n reflects a natural constraint, according to which the number of required shares cannot exceed the total number of participants, thereby ensuring the feasibility of the reconstruction procedure.
In accordance with the number of participants who can reconstruct the secret, k primes p 0 , p 1 , , p k 1 are selected.
We denote the secret (in this case, biometric data or a template) by Q . Then the coefficients a i of the polynomial f x for i = 0 , k 1 ¯ are computed according to the following relationships (6):
Q a 0 m o d p 0                 Q a 1 m o d p 1                   Q a k 1 ( m o d p k 1 )
Therefore, polynomial f x is defined as follows:
f x = a k 1 x k 1 + a k 2 x k 2 + + a 2 x 2 + a 1 x + a 0 .
For each participant, a number t i is randomly selected in such a way that i , j   t i t j , where i = 1 , n ¯ . Subsequently, components of the shares for all n participants are computed by Formula (8):
f t i   b i m o d   P ,   i = 1 , n ¯
Here P = j = 1 k p j . As a result, each participant receives their share in the following form: t i , b i , p 0 , p 2 , , p k 1 for i = 1 , n ¯ ,   j = 1 , k ¯ .
The block diagram of secret sharing is shown in Figure 2.
Each participant’s share is divided into k groups. Each group uses one modulus. To reconstruct the secret, it is necessary to involve at least one representative from each group. Otherwise, the secret cannot be recovered. The following is a pseudocode example of a scheme with a threshold of (5, 10) (Algorithm 1):
Algorithm 1. Example of a scheme with a threshold of (5, 10):
//Step 1: Initialize input values
1: ( t 1 , b 1 ) , ( t 2 , b 2 ) , ( t 3 , b 3 ) , ( t 4 , b 4 ) , ( t 5 , b 5 ) , ( t 6 , b 6 ) , ( t 7 , b 7 ) , ( t 8 , b 8 ) , ( t 9 , b 9 ) , ( t 10 , b 10 ) //Shares of participants
2: p 1 ,   p 2 ,   p 3 ,   p 4 ,   p 5 //Modules
//Step 2: Randomly distribute ( t i , b i )   pairs among groups
3: Group 1 =  { ( t 1 , b 1 ) , ( t 3 , b 3 ) }
4: Group 2 =  { ( t 2 , b 2 ) , ( t 10 , b 10 ) }
5: Group 3 =  { ( t 4 , b 4 ) }
6: Group 4 =  { ( t 7 , b 7 ) , ( t 9 , b 9 ) }
7: Group 5 =  { ( t 5 , b 5 ) , ( t 6 , b 6 ) , ( t 6 , b 6 ) }
//Step 3: Assign moduli to the groups ModulAssignments:
8:  p 1  → Group 1
9:  p 3 → Group 2
10:  p 2  → Group 3
11:  p 5    → Group 4
12:  p 4  → Group 5
//Step 4: Select at least one representative from each group
SelectedParticipants = {
13: Group 1:  ( t 1 , b 1 ) ,   p 1
14: Group 2:  ( t 10 , b 10 ) ,   p 3
15: Group 3:  ( t 4 , b 4 ) ,   p 2
16: Group 4:  ( t 7 , b 7 ) ,   p 5
17: Group 5:  ( t 5 , b 5 ) ,   p 4  
}
It should be emphasized that in the proposed scheme, the term “selection of a representative of each group” does not refer to generators of the multiplicative or additive group of integers modulo a prime p . A subgroup representative is a participant in the scheme who is assigned a specific share of the secret associated with the modulus p i . Thus, the term “representative” pertains exclusively to the organizational role within the scheme, rather than to the mathematical concept of a “group generator”.
The proposed scheme differs from classical approaches such as Shamir’s scheme (based on Lagrange interpolation), Blakley’s scheme (using vector spaces), and the Karnin-Greene-Hellman scheme (based on solving systems of linear equations), by providing higher resilience to participant compromise attacks. Dividing participants into groups adds an extra layer of protection: even if an adversary gains access to shares from the permitted number of participants, the secret cannot be reconstructed without the mandatory presence of at least one member from each group. This significantly reduces the risk of attacks involving an external entity impersonating a valid participant (e.g., acting as the k + 1 th party) for cryptographic analysis or brute-force guessing. While many existing schemes counter such threats by introducing authentication mechanisms, the proposed approach enhances security through the structure of the scheme itself.

3.1.2. Secret Reconstruction

At least k participants must combine their shares to recover the secret. To do this, k participants use their shares t i j , b i j , P where 1 i j n ,     j = 1 , k ¯ . Reconstruction can be performed in two ways:
  • Using Lagrange Interpolation Polynomial. The coefficients of the polynomial (7) are computed by the formula f x = j = 1 k b i j j = 1 , i l i j k x t i j t i l t i j , 1 i j n . The coefficients then define the system of congruences (6). Subse-quently, the secret Q is reconstructed based on the Chinese Remainder Theorem and Formula (5).
The block diagram of secret reconstruction is shown in Figure 3.
  • Using a System of Linear Equations. The following system is constructed as follows:
x k 1 t i 1 k 1 + x k 2 t i 1 k 2 + + x 2 t i 1 2 + x 1 t i 1 + x 0 b i 1 m o d P   x k 1 t i 2 k 1 + x k 2 t i 2 k 2 + + x 2 t i 2 2 + x 1 t i 2 + x 0 b i 2 m o d P   x k 1 t i k 1 k 1 + x k 2 t i k 1 k 2 + + x 2 t i k 1 2 + x 1 t i k 1 + x 0 b i k 1 m o d P x k 1 t i k k 1 + x k 2 t i k k 2 + + x 2 t i k 2 + x 1 t i k + x 0 b i k m o d P  
System (9) comprises k linear equations with k variables. Solving this system makes it possible to determine the coefficients of polynomial f x   in expression (7). The coefficients then define the set of congruences (6), which, together with the Chinese Remainder Theorem and Formula (5), allow for complete reconstruction of the secret.
The Lagrange interpolation method is recommended in cases where computational efficiency is a priority and all required subgroup representatives have provided valid shares. The system of linear equations method is more appropriate in scenarios that demand higher fault tolerance and the ability to verify the correctness of shares, as it allows inconsistencies to be detected.
We also clarified that both methods can be applied only if at least one representative from each subgroup participates. Otherwise, the system of equations or the interpolation polynomial remains underdetermined, and secret reconstruction becomes impossible.

4. Discussion

Let us consider the criteria for evaluating a secret sharing scheme that provide maximum confidentiality while minimizing memory and computational resources:
The solution of a system of k linear equations with k variables forms the basis of the algorithm. If the number of equations is less than k (in other words, if the number of participants holding shares is below the required threshold), the system has multiple solutions, preventing accurate reconstruction of the secret.
The choice of the number of subgroups and the ranges of moduli is determined by two factors: security requirements and the organizational structure of the system.
First, the number of subgroups k reflects the level of role-based separation of authority. If the system involves independent organizations (for example, multiple cloud providers or legally distinct parties), each of them should constitute a separate subgroup. Thus, k is selected in accordance with the number of independent trust domains that must be controlled.
Second, the selection of modulus ranges { p 0 , p 1 , , p k 1 } directly affects the cryptographic strength of the scheme. According to the Chinese Remainder Theorem, the overall secret space is determined by the product of the moduli P =   p 0 · p 1 · · p k 1 . The larger the value of P , the higher the level of security, since an adversary would need to consider a significantly broader range of possible secrets. To prevent brute-force attacks, each modulus p i   must be chosen sufficiently large and must be prime. In practice, it is recommended to use a modulus length of at least 1024 bits, which complies with modern security requirements.
Ideality of the scheme. A secret sharing scheme is considered perfect if no group of illegitimate participants can extract any information about the secret from their shares [3]. Furthermore, the scheme is called ideal if the size of each share is equal to the size of the original secret. In the proposed algorithm, the secret is uniformly distributed across all disseminated shares.
Resource consumption. Let us estimate the algorithm’s resource consumption. If we reserve 8 bytes for each of k polynomial coefficients and for each of n shares (taking into account both the argument and the value of the share), the total memory usage will be 8 × k + 2 n bytes. For example, when k = n = 32 the required memory is 768 bytes.

Scheme Complexity

Selecting k random primes and polynomial interpolation according to Formulas (6) and (7) has complexity O ( k ) .
Distributing the secret involves computing and disseminating triplets t i , b i , P for i   i = 1 , n ¯ , yielding a complexity of O ( k × n ) .
Thus, the overall computational complexity during the distribution phase is O ( k   ×   n ) .
Reconstruction of the secret using Lagrange polynomial interpolation has complexity O ( k 2 ) .
Reconstruction of the secret using the Chinese remainder theorem also has complexity O ( k 2 ) .
Taken together, the total complexity of the algorithm is O 2 k 2 + O ( k × n ) .
The results of evaluating these criteria for the proposed scheme are presented in Table 2.
During the study, 6 threshold secret sharing schemes were considered. The evaluation criteria included algorithm complexity for sharing and reconstruction, resource consumption, and security properties—perfection and ideality of the schemes. The results, presented in Table 3, allow for a comparative analysis of various methods. Here, the symbol “+” indicates that the considered scheme possesses the properties of ideality and perfection, while “−” denotes that these properties are not satisfied.
At the theoretical research stage, to optimize the software implementation of the secret sharing algorithm based on threshold schemes, algorithm complexity and resource consumption were analyzed. The algorithm’s execution time under different parameters was also measured. The results are presented below (see Table 4).
Consider the following approach. Let the moduli p 1 , p 2 , , p k   be known, and k 1 participants of the scheme possess their respective shares of the secret. Let us analyze the possibility of reconstructing the secret. Since there is a group of k 1 participants with the sets t i j , c i j , P , 1 i j n , j = 1 , k ¯ , we can form the following system of linear congruences:
x k 1 t i 1 k 1 + x k 2 t i 1 k 2 + + x 2 t i 1 2 + x 1 t i 1 + x 0 c i 1 m o d P   x k 1 t i 2 k 1 + x k 2 t i 2 k 2 + + x 2 t i 2 2 + x 1 t i 2 + x 0 c i 2 m o d P   x k 1 t i k 1 k 1 + x k 2 t i k 1 k 2 + + x 2 t i k 1 2 + x 1 t i k 1 + x 0 c i k 1 m o d P x k 1 B k + x k 2 B k 1 + + x 2 B 3 + x 1 B 2 + x 0 B 1 X m o d P  
In this system, the values c i j , t i j l ( 1 i j n , j = 1 , k 1 ¯ , l = 1 , k 1 ¯ ) and B j   (for j = 1 , k 1 ¯ ) are considered known. Thus, we have a system of k linear equations with k + 1 unknowns. According to linear algebra, such a system has infinitely many solutions and can be satisfied for arbitrary values of the k + 1 th variable.
x 0 c 1 + t 1 X m o d P                         x 1 c 2 + t 2 X m o d P                                                           x k 2 c k 1 + t k 1 X m o d P x k 1 c k + t k X m o d P                
Here c i , t i for i = 1 , k ¯ are known (determined) values.
Adding the condition X x j ( m o d p j ) to this system (11) does not reduce its set of solutions, because these sets are equivalent.
Let the secret Q be uniquely determined by the system of congruences
Q a i m o d p i , i = 1 , , k ,
where p i are pairwise coprime moduli corresponding to the subgroups, and P = i = 1 k p i . Assume that each subgroup provides at least one valid share containing the residue a i m o d p i .
If at least one modulus p j is missing, the system of congruences becomes incomplete. In this case, the set of solutions takes the form
Q a ( m o d P )
where P = i j p i . Since P < P = j = 1 k p i , the secret is no longer uniquely defined but corresponds to a set of P P different values. This means that adversaries, even if colluding and combining k shares, cannot uniquely reconstruct the secret without the participation of at least one representative from each subgroup.
Thus, the requirement of mandatory subgroup participation is an inherent mathematical constraint of the scheme and ensures its resilience against internal collusion.
If a participant of the scheme provides erroneous (false) information from their share, there is a probability that this share will not be involved in solving the system of congruences.
There are n k possible ways to choose k participants out of n . The number of ways to select k participants such that a specific fixed participant is not included equals n 1 k . Therefore, the probability that, in a random selection of k participants, the fixed participant is not chosen is
p = n 1 k n k = n k n ,
Here, p denotes the probability that a particular participant will not be included in a randomly selected subset of k participants. The selection of k participants is assumed to be uniformly random over all n k subsets. This formula thus provides a statistical estimate and does not account for strategic participant behavior (such as targeted sabotage or other adversarial actions), which should be analyzed separately within the threat model.

5. Conclusions

Secret sharing schemes are among the key areas in the field of information security. This paper presents a new secret sharing scheme with mandatory subgroup participation and analyzes its properties.
The study addresses the issues of secure distribution of confidential information and its reliable reconstruction. Unlike most existing secret sharing schemes, the proposed solution is initially designed with enhanced resistance to internal threats and cryptographic attacks. While other approaches rely on additional authentication mechanisms to prevent such attacks, the proposed scheme is inherently resilient: even if an adversary gains access to the shares of k legitimate participants, they will not be able to reconstruct the secret Q without satisfying the structural requirement of having representatives from all subgroups.
A theoretical and computational complexity analysis of the algorithm was carried out, along with an assessment of potential threats posed by both external adversaries and untrustworthy internal participants. The results showed that the proposed scheme possesses the property of ideality (in the sense of exact reconstruction under the defined conditions) and demonstrates high resource efficiency, making it a promising option for practical applications.
Reliability, ease of implementation, and resistance to adversarial actions make the proposed scheme a suitable solution for modern challenges in secure authentication and the distributed storage of sensitive information.
The algorithm has been implemented in C# and tested on practical use cases. Future work will focus on further improving the algorithm’s robustness and exploring its applicability in various scenarios, with the results to be presented in subsequent publications.

Author Contributions

Conceptualization, D.D. and A.K.; methodology, N.K.; software, D.D.; validation, N.K., A.K. and K.A.; formal analysis, D.D.; investigation, A.K.; resources, N.K.; data curation, A.K.; writing—original draft preparation, N.K.; writing—review and editing, K.A.; visualization, K.A.; supervision, D.D.; project administration, N.K.; funding acquisition, A.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Ministry of Science and Higher Education of the Republic of Kazakhstan and carried out within the framework of project AP23487787 “Development of an algorithm for reliable storage of biometric data of authentication systems in spatially distributed repositories” at the Institute of Information and Computational Technologies.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors are grateful to all lab members of the Information Security Laboratory (Institute of Information and Computational Technologies) for their useful suggestions and support.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
SSSSecret Sharing Scheme
CRTChinese Remainder Theorem
LIPLagrange Interpolation Polynomial

References

  1. Čuřík, P.; Ploszek, R.; Zajac, P. Practical Use of Secret Sharing for Enhancing Privacy in Clouds. Electronics 2022, 11, 2758. [Google Scholar] [CrossRef]
  2. Huang, C.-W.; Juan, J.S.-T. New (t, n)-Threshold P-VSS Schemes Using Fewer Types of Polarizers. Eng. Proc. 2025, 92, 49. [Google Scholar] [CrossRef]
  3. Liu, Y.; Sun, Q.; Yang, Z.; Zhou, Y.; Zhao, W.; Shi, D. Progressive Reconstruction on Region-Based Secret Image Sharing. Electronics 2024, 13, 1529. [Google Scholar] [CrossRef]
  4. Liu, Y.X.; Yang, C.N.; Wu, S.Y.; Chou, Y.S.; Sun, Q.D. Progressive (k,n) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 2018, 55, 766–777. [Google Scholar] [CrossRef]
  5. Mogilevskaya, N.S.; Kulbikayan, R.V.; Zhuravlev, L.A. Threshold File Sharing Based on Bit Masks: Ideas and Possible Applications. Bull. Don State Tech. Univ. 2011, 11, 1749–1754. (In Russian) [Google Scholar]
  6. Gao, S.; Ding, S.; Ho-Ching Iu, H.; Erkan, U.; Toktas, A.; Simsek, C.; Wu, R.; Xu, X.; Cao, Y.; Mou, J. A three-dimensional memristor-based hyperchaotic map for pseudorandom number generation and multi-image encryption. Chaos 2025, 35, 073105. [Google Scholar] [CrossRef] [PubMed]
  7. Chervyakov, N.I.; Deryabin, M.A. A new method of threshold secret sharing based on residue class systems. Inf. Technol. 2016, 22, 211–219. (In Russian) [Google Scholar]
  8. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  9. Buchanan, W.J. Shamir Secret Sharing (SSS). Asecuritysite.com. 2024. Available online: https://asecuritysite.com/shares (accessed on 30 April 2024).
  10. Alam, I.; Alali, A.S.; Ali, S.; Asri, M.S.M. A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure. Axioms 2024, 13, 515. [Google Scholar] [CrossRef]
  11. Zou, S.; Liang, Y.; Lai, L.; Shamai, S. An information theoretic approach to secret sharing. IEEE Trans. Inf. Theory 2015, 61, 3121–3136. [Google Scholar] [CrossRef]
  12. Watanabe, Y.; Shikata, J. Timed-release secret sharing scheme with information theoretic security. arXiv 2014, arXiv:1401.5895. [Google Scholar] [CrossRef]
  13. Xu, R.; Wang, X.; Morozov, K.; Cheng, C.; Ding, J. Revisiting Group Oriented Secret Sharing Schemes. Inf. Sci. 2022, 589, 751–769. [Google Scholar] [CrossRef]
  14. Binu, V.P.; Sreekumar, A. Threshold multi-secret sharing using elliptic curve and pairing. arXiv 2016, arXiv:1603.09524. [Google Scholar] [CrossRef]
  15. Chervyakov, N.I.; Kocherov, Y.N. Modification of Asmuth-Bloom data sharing scheme using the fractal geometry method. Infocommun. Technol. 2017, 15, 7–14. (In Russian) [Google Scholar] [CrossRef]
  16. Bahman, R.; Ziba, E. A verifiable threshold secret sharing scheme based on lattices. Inf. Sci. 2019, 501, 655–661. [Google Scholar] [CrossRef]
  17. Gao, S.; Zhang, Z.; Iu, H.H.-C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y.; et al. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
  18. Prashanti, G.; Bhat, M.N. Cheating identifiable polynomial based secret sharing scheme for audio and image. Multimed. Tools Appl. 2024, 83, 403–423. [Google Scholar] [CrossRef]
  19. Tsai, Y.-Y.; Jhou, J.-Y.; You, T.-Y.; Lu, C.-T. Advancing Secret Sharing in 3D Models Through Vertex Index Sharing. Electronics 2025, 14, 1675. [Google Scholar] [CrossRef]
  20. Du, J.; Dai, C.; Mao, P.; Dong, W.; Wang, X.; Li, Z. An Efficient Lightweight Authentication Scheme for Smart Meter. Mathematics 2024, 12, 1264. [Google Scholar] [CrossRef]
Figure 1. General structure of a secret sharing scheme.
Figure 1. General structure of a secret sharing scheme.
Applsci 15 09550 g001
Figure 2. The block diagram of secret sharing.
Figure 2. The block diagram of secret sharing.
Applsci 15 09550 g002
Figure 3. The block diagram of secret reconstruction.
Figure 3. The block diagram of secret reconstruction.
Applsci 15 09550 g003
Table 1. Notations and their meanings.
Table 1. Notations and their meanings.
NotationMeaning
Q Secret information
nTotal number of participants
kThreshold value—the minimum number of participants required to reconstruct the secret
(k, n)Threshold scheme: out of n participants, at least k are required for reconstruction
p k Prime number used as the modulus for the k th participant
f(x)Lagrange interpolation polynomial
a i Polynomial coefficients
t i Random number of each participant
b i Share of the secret assigned to the i th participant
Table 2. Evaluation of the proposed secret sharing scheme.
Table 2. Evaluation of the proposed secret sharing scheme.
Threshold SchemeComplexity RatingResource
Consumption (KB)
PerfectionIdeality
SSS by Lagrange formula O 2 k 2 + O ( k × n ) 0.768++
SSS by CRT O k 2 + O ( n ) 8++
Table 3. Evaluation results and comparison of threshold secret sharing schemes.
Table 3. Evaluation results and comparison of threshold secret sharing schemes.
Threshold SchemeComplexity RatingResource
Consumption (KB)
PerfectionIdeality
Shamir’s scheme O k × n + O ( k 2 ) 0.5++
Blackley’s scheme O k × n + O ( k 3 ) 8+
SSS based on Elliptic Curves O k × n + O ( k 2 ) 1000+
Karnin–Green–Hellman scheme O n + O ( k 3 ) 16+
Asmuth–Blum scheme O n + O k 2 13++
Proposed secret sharing scheme O 2 k 2 + O ( k × n ) 0.768++
Table 4. Experimental results.
Table 4. Experimental results.
Evaluation Criteria n = 5 , k = 3 ,
Q = 512
n = 32 , k = 32 ,
Q = 512
n = 128 , k = 128 ,
Q = 512
Shamir’s scheme
Secret sharing time
Secret reconstruction time
Memory consumption
5 ms;
1 ms;
1560 bytes
7 ms;
2 ms;
6720 bytes
75 ms;
27 ms;
100,608 bytes
Asmuth–Blum scheme
Secret sharing time
Secret reconstruction time
Memory consumption
103 ms;
1 ms;
3456 bytes
1145 ms;
4 ms;
274,432 bytes
3032 ms;
97 ms;
4,243,456 bytes
SSS based on Eliiptic Curves
Secret sharing time
Secret reconstruction time
Memory consumption
15 ms;
1 ms;
1365 bytes
1058 ms;
617 ms;
6432 bytes
85,193 ms;
47326 ms;
99,456 bytes
Proposed secret sharing scheme
Secret sharing time
Secret reconstruction time
Memory consumption
6 ms;
2 ms;
1625 bytes
14 ms;
7 ms;
9678 bytes
103 ms;
42 ms;
104,466 bytes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kapalova, N.; Dyusenbayev, D.; Khompysh, A.; Algazy, K. Design of a Secret Sharing Scheme with Mandatory Subgroup Participation. Appl. Sci. 2025, 15, 9550. https://doi.org/10.3390/app15179550

AMA Style

Kapalova N, Dyusenbayev D, Khompysh A, Algazy K. Design of a Secret Sharing Scheme with Mandatory Subgroup Participation. Applied Sciences. 2025; 15(17):9550. https://doi.org/10.3390/app15179550

Chicago/Turabian Style

Kapalova, Nursulu, Dilmukhanbet Dyusenbayev, Ardabek Khompysh, and Kunbolat Algazy. 2025. "Design of a Secret Sharing Scheme with Mandatory Subgroup Participation" Applied Sciences 15, no. 17: 9550. https://doi.org/10.3390/app15179550

APA Style

Kapalova, N., Dyusenbayev, D., Khompysh, A., & Algazy, K. (2025). Design of a Secret Sharing Scheme with Mandatory Subgroup Participation. Applied Sciences, 15(17), 9550. https://doi.org/10.3390/app15179550

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop