Simplest (3,2) Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Function

Main Article Content

Sergei Kulikov

Abstract

This paper presents a new XOR-based secret sharing scheme designed for simplicity, efficiency, and strong security guarantees. Unlike traditional threshold schemes that rely on matrix operations and work on large data blocks, the proposed method operates on a per-byte basis, applying lightweight bytewise XOR calculations. The goal of this research is to create a minimalistic yet robust (3,2) threshold secret sharing algorithm that is practical for real-world systems with constrained computational resources. The proposed scheme divides a secret file into three independent shadow shares using a simple transformation: each share is generated as the XOR of the secret with a random byte string and a shifted version of that string. Specifically, the algorithm uses one random string and constructs the second and third shares by XOR-ing the secret with the random string and with the string shifted by one byte in opposite directions. This process is applied independently to each byte of the secret file. The resulting scheme is both perfect and ideal: each share is the same size as the original file, and no information about the secret can be obtained from a single share. Any two out of three shares are sufficient to reconstruct the original data, while fewer reveal nothing. The encoding and decoding procedures are transparent, computationally efficient, and well-suited for implementation in hardware or constrained environments. The algorithm was implemented in Fortran and can be easily integrated into secure cloud storage systems, distributed communication protocols, or embedded devices. This work contributes a lightweight alternative to existing XOR-based sharing methods, providing a novel balance between cryptographic strength and algorithmic simplicity.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Sergei Kulikov , Tran., “Simplest (3,2) Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Function”, IJCNS, vol. 5, no. 2, pp. 12–16, Nov. 2025, doi: 10.54105/ijcns.B1442.05021125.
Section
Articles

How to Cite

[1]
Sergei Kulikov , Tran., “Simplest (3,2) Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR Function”, IJCNS, vol. 5, no. 2, pp. 12–16, Nov. 2025, doi: 10.54105/ijcns.B1442.05021125.
Share |

References

Chen, L., Laing, T.M., Martin, K.M. (2016). Efficient, XOR-Based, Ideal (t,n)−threshold Schemes. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. Lecture Notes in Computer Science(), vol 10052. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-48965-0_28

Wang H, Jiang Z, Qian Q, Wang H. An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms. International Journal of Distributed Sensor Networks. 2022;18(4). DOI: http://doi.org/10.1177/15501329221084223

Shima K., Doi H. Hierarchical Secret-Sharing Scheme Based on XOR Operations, Journal of Information Processing, September 2024, 32:719-730, DOI: http://doi.org/10.2197/ipsjjip.32.719

Most read articles by the same author(s)

1 2 > >>