Next Article in Journal
Optically Transparent Honeycomb Mesh Antenna Integrated into OLED Light Source
Next Article in Special Issue
Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
Previous Article in Journal
A Study on Machine Learning-Enhanced Roadside Unit-Based Detection of Abnormal Driving in Autonomous Vehicles
Previous Article in Special Issue
Threshold/Multi Adaptor Signature and Their Applications in Blockchains
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

by
Jingyu Chen
,
Haitao Deng
,
Huachang Su
,
Minghao Yuan
and
Yongjun Ren
*
School of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(2), 287; https://doi.org/10.3390/electronics13020287
Submission received: 11 December 2023 / Revised: 5 January 2024 / Accepted: 6 January 2024 / Published: 8 January 2024
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems)

Abstract

As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been applied in different fields. The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in key protection, secure multi-party computation, privacy protection, etc. However, with the rapid development of quantum computing, many existing cryptography-underlying technologies are facing huge difficulties and challenges. Therefore, post-quantum TSS has important research significance and value for the future development of cryptography. In this paper, we summarize the existing secret sharing schemes based on lattice-hard problems and the relevant applications of these schemes in the post-quantum realm. We classify existing lattice-based TSS according to different functions and introduce typical solutions. To the best of our knowledge, this is the first review paper on lattice-based TSS schemes.
Keywords: threshold secret sharing; post-quantum security; lattice-based cryptography threshold secret sharing; post-quantum security; lattice-based cryptography

Share and Cite

MDPI and ACS Style

Chen, J.; Deng, H.; Su, H.; Yuan, M.; Ren, Y. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey. Electronics 2024, 13, 287. https://doi.org/10.3390/electronics13020287

AMA Style

Chen J, Deng H, Su H, Yuan M, Ren Y. Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey. Electronics. 2024; 13(2):287. https://doi.org/10.3390/electronics13020287

Chicago/Turabian Style

Chen, Jingyu, Haitao Deng, Huachang Su, Minghao Yuan, and Yongjun Ren. 2024. "Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey" Electronics 13, no. 2: 287. https://doi.org/10.3390/electronics13020287

APA Style

Chen, J., Deng, H., Su, H., Yuan, M., & Ren, Y. (2024). Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey. Electronics, 13(2), 287. https://doi.org/10.3390/electronics13020287

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop