ApproximateSecret Sharing in Field of Real Numbers
Guardat en:
| Publicat a: | Entropy vol. 27, no. 7 (2025), p. 769-791 |
|---|---|
| Autor principal: | |
| Altres autors: | , , |
| Publicat: |
MDPI AG
|
| Matèries: | |
| Accés en línia: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3233183620 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1099-4300 | ||
| 024 | 7 | |a 10.3390/e27070769 |2 doi | |
| 035 | |a 3233183620 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231460 |2 nlm | ||
| 100 | 1 | |a Wan Jiaqi |u College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China; jiaqiwan2004@163.com (J.W.); 15211139646@163.com (Z.W.); publictiger@126.com (X.Y.) | |
| 245 | 1 | |a ApproximateSecret Sharing in Field of Real Numbers | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a In the era of big data, the security of information encryption systems has garnered extensive attention, particularly in critical domains such as financial transactions and medical data management. While traditional Shamir’s Secret Sharing (SSS) ensures secure integer sharing through threshold cryptography, it exhibits inherent limitations when applied to floating-point domains and high-precision numerical scenarios. To address these issues, this paper proposes an innovative algorithm to optimize SSS via type-specific coding for real numbers. By categorizing real numbers into four types—rational numbers, special irrationals, common irrationals, and general irrationals—our approach achieves lossless transmission for rational numbers, special irrationals, and common irrationals, while enabling low-loss recovery for general irrationals. The scheme leverages a type-coding system to embed data category identifiers in polynomial coefficients, combined with Bernoulli-distributed random bit injection to enhance security. The experimental results validate its effectiveness in balancing precision and security across various real-number types. | |
| 653 | |a Data management | ||
| 653 | |a Machine learning | ||
| 653 | |a Data integrity | ||
| 653 | |a Algorithms | ||
| 653 | |a Big Data | ||
| 653 | |a Security | ||
| 653 | |a Floating point arithmetic | ||
| 653 | |a Prime numbers | ||
| 653 | |a Real numbers | ||
| 653 | |a Coding | ||
| 653 | |a Polynomials | ||
| 700 | 1 | |a Wang Ziyue |u College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China; jiaqiwan2004@163.com (J.W.); 15211139646@163.com (Z.W.); publictiger@126.com (X.Y.) | |
| 700 | 1 | |a Yu, Yongqiang |u College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China; jiaqiwan2004@163.com (J.W.); 15211139646@163.com (Z.W.); publictiger@126.com (X.Y.) | |
| 700 | 1 | |a Xuehu, Yan |u College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China; jiaqiwan2004@163.com (J.W.); 15211139646@163.com (Z.W.); publictiger@126.com (X.Y.) | |
| 773 | 0 | |t Entropy |g vol. 27, no. 7 (2025), p. 769-791 | |
| 786 | 0 | |d ProQuest |t Engineering Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3233183620/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3233183620/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3233183620/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |