{"id":"https://openalex.org/W7154326243","doi":"https://doi.org/10.3390/cryptography10020026","title":"A Multiple User Cryptography Approach Using a One-Time User Key Model and a (1, n) Threshold Polynomial Secret Sharing","display_name":"A Multiple User Cryptography Approach Using a One-Time User Key Model and a (1, n) Threshold Polynomial Secret Sharing","publication_year":2026,"publication_date":"2026-04-14","ids":{"openalex":"https://openalex.org/W7154326243","doi":"https://doi.org/10.3390/cryptography10020026"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020026","pdf_url":"https://www.mdpi.com/2410-387X/10/2/26/pdf?version=1776175192","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/2/26/pdf?version=1776175192","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Alessandro Caniglia","orcid":"https://orcid.org/0009-0008-6713-7788"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Caniglia","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy"],"raw_orcid":"https://orcid.org/0009-0008-6713-7788","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117074491","display_name":"Felice Franchini","orcid":"https://orcid.org/0009-0000-8887-800X"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Felice Franchini","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy"],"raw_orcid":"https://orcid.org/0009-0000-8887-800X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085849149","display_name":"Stefano Galantucci","orcid":"https://orcid.org/0000-0002-3955-0478"},"institutions":[{"id":"https://openalex.org/I106296451","display_name":"University of Foggia","ror":"https://ror.org/01xtv3204","country_code":"IT","type":"education","lineage":["https://openalex.org/I106296451"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Galantucci","raw_affiliation_strings":["Department of Agricultural Sciences, Food, Natural Resources and Engineering (DAFNE), University of Foggia, 71122 Foggia, Italy"],"raw_orcid":"https://orcid.org/0000-0002-3955-0478","affiliations":[{"raw_affiliation_string":"Department of Agricultural Sciences, Food, Natural Resources and Engineering (DAFNE), University of Foggia, 71122 Foggia, Italy","institution_ids":["https://openalex.org/I106296451"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038436210","display_name":"Giuseppe Pirlo","orcid":"https://orcid.org/0000-0002-7305-2210"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Pirlo","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy"],"raw_orcid":"https://orcid.org/0000-0002-7305-2210","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085743970","display_name":"Gianfranco Semeraro","orcid":"https://orcid.org/0000-0003-1666-8323"},"institutions":[{"id":"https://openalex.org/I5561750","display_name":"University of Bari Aldo Moro","ror":"https://ror.org/027ynra39","country_code":"IT","type":"education","lineage":["https://openalex.org/I5561750"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Gianfranco Semeraro","raw_affiliation_strings":["Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy"],"raw_orcid":"https://orcid.org/0000-0003-1666-8323","affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bari Aldo Moro, 72125 Bari, Italy","institution_ids":["https://openalex.org/I5561750"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085743970"],"corresponding_institution_ids":["https://openalex.org/I5561750"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7711556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"26","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.3684999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.3684999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.16779999434947968,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.12240000069141388,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5672000050544739},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5468999743461609},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47920000553131104},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.43959999084472656},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.415800005197525},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.41019999980926514},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4049000144004822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7149999737739563},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5672000050544739},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5468999743461609},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5026000142097473},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47920000553131104},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.43959999084472656},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.415800005197525},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.41019999980926514},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4049000144004822},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.38909998536109924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3822000026702881},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.35019999742507935},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.33629998564720154},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.30300000309944153},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.30160000920295715},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.26089999079704285},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2538999915122986}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020026","pdf_url":"https://www.mdpi.com/2410-387X/10/2/26/pdf?version=1776175192","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:adea2ff5ff9d472aa4c4bfb108ef7c58","is_oa":true,"landing_page_url":"https://doaj.org/article/adea2ff5ff9d472aa4c4bfb108ef7c58","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 2, p 26 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10020026","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020026","pdf_url":"https://www.mdpi.com/2410-387X/10/2/26/pdf?version=1776175192","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7570457458496094,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G368175741","display_name":null,"funder_award_id":"H93C22000620001","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G4917700297","display_name":null,"funder_award_id":"PE0000014","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7154326243.pdf","grobid_xml":"https://content.openalex.org/works/W7154326243.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W2006088653","https://openalex.org/W2056634549","https://openalex.org/W2096024255","https://openalex.org/W2108834246","https://openalex.org/W2133062571","https://openalex.org/W2141420453","https://openalex.org/W2535739715","https://openalex.org/W2898356255","https://openalex.org/W2965317690","https://openalex.org/W2970097841","https://openalex.org/W3022074522","https://openalex.org/W3090813372","https://openalex.org/W3091247662","https://openalex.org/W3121126693","https://openalex.org/W3201909093","https://openalex.org/W3209938717","https://openalex.org/W4294133262","https://openalex.org/W4384210424","https://openalex.org/W4389844109","https://openalex.org/W4395071737","https://openalex.org/W4410219460"],"related_works":[],"abstract_inverted_index":{"Classical":[0],"approaches":[1],"to":[2,9,34,97,104,143,184],"cryptography":[3],"exhibit":[4],"several":[5],"limitations":[6,25],"when":[7],"applied":[8],"scenarios":[10],"involving":[11],"more":[12],"than":[13],"two":[14],"users.":[15],"The":[16,89,190],"One-Time":[17,55],"User":[18],"Key":[19],"(OTUK)":[20],"meta-cryptographic":[21],"model":[22],"addresses":[23],"these":[24,59],"by":[26],"enabling":[27],"multi-user":[28,69,201],"encryption":[29,107],"that":[30,66,171],"is":[31,102],"flexible,":[32],"applicable":[33],"any":[35],"cryptographic":[36],"algorithm,":[37],"and":[38,101,120,131,148,167,197,211],"designed":[39],"for":[40,116,180,200],"systematic":[41,158],"deployment":[42],"without":[43],"compromising":[44],"system":[45],"security.":[46],"Each":[47],"user":[48,99],"possesses":[49],"an":[50],"individual":[51],"key":[52],"from":[53],"which":[54],"keys":[56,60,100],"are":[57],"derived;":[58],"feed":[61],"a":[62,77,85,111,121,149,194],"secret-sharing":[63],"function":[64,83],"(\u03c9)":[65],"establishes":[67],"the":[68,81,105,117,126,172],"encrypted":[70,202],"channel.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75,134],"present":[76,135],"polynomial-based":[78],"implementation":[79],"of":[80,182],"\u03c9":[82],"under":[84],"(1,n)":[86],"threshold":[87],"model.":[88],"generated":[90],"polynomial":[91],"has":[92],"roots":[93],"at":[94],"points":[95],"corresponding":[96],"valid":[98],"mapped":[103],"real":[106],"key.":[108],"We":[109],"provide":[110],"formal":[112],"threat":[113],"model,":[114],"pseudocode":[115],"complete":[118],"protocol,":[119],"detailed":[122],"computational":[123],"analysis":[124,160],"across":[125],"numerical":[127],"domains":[128,205],"N,":[129],"Z,":[130],"R.":[132],"Furthermore,":[133],"experimental":[136],"benchmarks":[137],"measuring":[138],"encryption/decryption":[139],"speed,":[140],"scalability":[141],"up":[142,183],"30":[144,185],"users,":[145],"parameter":[146],"sensitivity,":[147],"comparative":[150],"evaluation":[151],"against":[152],"Shamir\u2019s":[153],"Secret":[154],"Sharing":[155],"scheme.":[156],"A":[157],"security":[159,174],"examines":[161],"partial-information":[162],"attacks,":[163],"derivative-root":[164],"distance":[165],"margins,":[166],"brute-force":[168],"resistance,":[169],"demonstrating":[170],"effective":[173],"margin":[175],"remains":[176],"above":[177],"245":[178],"bits":[179],"configurations":[181],"users":[186],"with":[187],"256-bit":[188],"keys.":[189],"proposed":[191],"method":[192],"offers":[193],"concrete,":[195],"efficient,":[196],"secure":[198],"foundation":[199],"communication":[203],"in":[204],"such":[206],"as":[207],"IoT,":[208],"public":[209],"administration,":[210],"e-health.":[212]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-04-15T00:00:00"}
