Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different diff...

Full description

Bibliographic Details
Main Authors: Jingyu Chen, Haitao Deng, Huachang Su, Minghao Yuan, Yongjun Ren
Format: Article
Language:English
Published: MDPI AG 2024-01-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/13/2/287
_version_ 1797344240973381632
author Jingyu Chen
Haitao Deng
Huachang Su
Minghao Yuan
Yongjun Ren
author_facet Jingyu Chen
Haitao Deng
Huachang Su
Minghao Yuan
Yongjun Ren
author_sort Jingyu Chen
collection DOAJ
description As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been applied in different fields. The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in key protection, secure multi-party computation, privacy protection, etc. However, with the rapid development of quantum computing, many existing cryptography-underlying technologies are facing huge difficulties and challenges. Therefore, post-quantum TSS has important research significance and value for the future development of cryptography. In this paper, we summarize the existing secret sharing schemes based on lattice-hard problems and the relevant applications of these schemes in the post-quantum realm. We classify existing lattice-based TSS according to different functions and introduce typical solutions. To the best of our knowledge, this is the first review paper on lattice-based TSS schemes.
first_indexed 2024-03-08T10:59:30Z
format Article
id doaj.art-c169f9a52c4648fb8cc7961163123dec
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-08T10:59:30Z
publishDate 2024-01-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-c169f9a52c4648fb8cc7961163123dec2024-01-26T16:13:05ZengMDPI AGElectronics2079-92922024-01-0113228710.3390/electronics13020287Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A SurveyJingyu Chen0Haitao Deng1Huachang Su2Minghao Yuan3Yongjun Ren4School of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaSchool of Computer Science, Nanjing University of Information Science & Technology, Nanjing 210044, ChinaAs the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, lattice cryptography schemes based on different difficult problems have been applied in different fields. The threshold secret sharing (TSS) scheme is an important field of cryptography and has important application value and development prospects in key protection, secure multi-party computation, privacy protection, etc. However, with the rapid development of quantum computing, many existing cryptography-underlying technologies are facing huge difficulties and challenges. Therefore, post-quantum TSS has important research significance and value for the future development of cryptography. In this paper, we summarize the existing secret sharing schemes based on lattice-hard problems and the relevant applications of these schemes in the post-quantum realm. We classify existing lattice-based TSS according to different functions and introduce typical solutions. To the best of our knowledge, this is the first review paper on lattice-based TSS schemes.https://www.mdpi.com/2079-9292/13/2/287threshold secret sharingpost-quantum securitylattice-based cryptography
spellingShingle Jingyu Chen
Haitao Deng
Huachang Su
Minghao Yuan
Yongjun Ren
Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
Electronics
threshold secret sharing
post-quantum security
lattice-based cryptography
title Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
title_full Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
title_fullStr Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
title_full_unstemmed Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
title_short Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
title_sort lattice based threshold secret sharing scheme and its applications a survey
topic threshold secret sharing
post-quantum security
lattice-based cryptography
url https://www.mdpi.com/2079-9292/13/2/287
work_keys_str_mv AT jingyuchen latticebasedthresholdsecretsharingschemeanditsapplicationsasurvey
AT haitaodeng latticebasedthresholdsecretsharingschemeanditsapplicationsasurvey
AT huachangsu latticebasedthresholdsecretsharingschemeanditsapplicationsasurvey
AT minghaoyuan latticebasedthresholdsecretsharingschemeanditsapplicationsasurvey
AT yongjunren latticebasedthresholdsecretsharingschemeanditsapplicationsasurvey