Loading

Simplest (3,2) Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Function
Sergei Kulikov

Sergei Kulikov, Head, Department of Biostatistics, National Research Center for Hematology, Novozykovsky pr. 4A, MOSCOW, Russian Federation (RUS), Russia.  

Manuscript received on 25 July 2025 | First Revised Manuscript received on 02 August 2025 | Second Revised Manuscript received on 17 October 2025 | Manuscript Accepted on 15 November 2025 | Manuscript published on 30 November 2025 | PP: 12-16 | Volume-5 Issue-2, November 2025 | Retrieval Number: 100.1/ijcns.B144205021125 | DOI: 10.54105/ijcns.B1442.05021125

Open Access | Ethics and Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Published by Lattice Science Publication (LSP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper presents a new XOR-based secret sharing scheme designed for simplicity, efficiency, and strong security guarantees. Unlike traditional threshold schemes that rely on matrix operations and work on large data blocks, the proposed method operates on a per-byte basis, applying lightweight bytewise XOR calculations. The goal of this research is to create a minimalistic yet robust (3,2) threshold secret sharing algorithm that is practical for real-world systems with constrained computational resources. The proposed scheme divides a secret file into three independent shadow shares using a simple transformation: each share is generated as the XOR of the secret with a random byte string and a shifted version of that string. Specifically, the algorithm uses one random string and constructs the second and third shares by XOR-ing the secret with the random string and with the string shifted by one byte in opposite directions. This process is applied independently to each byte of the secret file. The resulting scheme is both perfect and ideal: each share is the same size as the original file, and no information about the secret can be obtained from a single share. Any two out of three shares are sufficient to reconstruct the original data, while fewer reveal nothing. The encoding and decoding procedures are transparent, computationally efficient, and well-suited for implementation in hardware or constrained environments. The algorithm was implemented in Fortran and can be easily integrated into secure cloud storage systems, distributed communication protocols, or embedded devices. This work contributes a lightweight alternative to existing XOR-based sharing methods, providing a novel balance between cryptographic strength and algorithmic simplicity.

Keywords: Secret Sharing. Cryptographic Protocols, Real-Time Systems.
Scope of the Article: Cryptographic Algorithms