Shamir's Secret Sharing for Authentication without Reconstructing Password

被引:0
|
作者
Gupta, Kishor Datta [1 ]
Rahman, Md Lutfar [1 ]
Dasgupta, Dipankar [1 ]
Poudyal, Subash [1 ]
机构
[1] Univ Memphis, Dept CS, Memphis, TN 38152 USA
关键词
Shamir's secret sharing; Security; Threshold cryptography; Authentication; Password;
D O I
10.1109/ccwc47524.2020.9031270
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Shamir's Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharing. But it can also be used for authentication protocols as a replacement of hashing. In this paper, we propose an authentication protocol which will use Shamir's secret sharing method to authenticate with server. Hashing may not be able to hide data as effective in post quantum era. So in post quantum era, if any data server get exposed, users credentials can be also compromised as they were hidden by using hashing as an one way encryption. Our protocol will be able to solve this problem in a way that complete data exposure from server will not reveal the actual password provided by the user. So, even if the user uses same password for other online services/systems, these services and systems will not be effected.
引用
收藏
页码:958 / 963
页数:6
相关论文
共 50 条
  • [1] Authentication as A Service Based on Shamir Secret Sharing
    Bissoli, Andrea
    d'Amore, Fabrizio
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
  • [2] Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
    Nakkar, Mouna
    Altawy, Riham
    Youssef, Amr
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3412 - 3429
  • [3] Enhanced Visual Secret Sharing For Graphical Password Authentication
    Rajendra, A. B.
    Sheshadri, H. S.
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [4] Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach
    Bansal, Gaurang
    Sikdar, Biplab
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3598 - 3610
  • [5] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
  • [6] Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing
    Chen, Shuai
    Li, Bing
    Chen, Ziheng
    Zhang, Yan
    Wang, Caicai
    Tao, Cheng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14408 - 14425
  • [7] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [8] Faulty share detection in Shamir's secret sharing
    Uteshev, A. Yu
    Marov, A., V
    VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2019, 15 (02): : 274 - 282
  • [9] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [10] AuSDiDe: Towards a New Authentication System for Distributed and Decentralized Structure based on Shamir's Secret Sharing
    Sefraoui, Omar
    Bouzidi, Afaf
    Ghoumid, Kamal
    Ar-Reyouchi, El Miloud
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 782 - 787