Shamir's Secret Sharing for Authentication without Reconstructing Password

被引:0
|
作者
Gupta, Kishor Datta [1 ]
Rahman, Md Lutfar [1 ]
Dasgupta, Dipankar [1 ]
Poudyal, Subash [1 ]
机构
[1] Univ Memphis, Dept CS, Memphis, TN 38152 USA
来源
2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) | 2020年
关键词
Shamir's secret sharing; Security; Threshold cryptography; Authentication; Password;
D O I
10.1109/ccwc47524.2020.9031270
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Shamir's Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharing. But it can also be used for authentication protocols as a replacement of hashing. In this paper, we propose an authentication protocol which will use Shamir's secret sharing method to authenticate with server. Hashing may not be able to hide data as effective in post quantum era. So in post quantum era, if any data server get exposed, users credentials can be also compromised as they were hidden by using hashing as an one way encryption. Our protocol will be able to solve this problem in a way that complete data exposure from server will not reveal the actual password provided by the user. So, even if the user uses same password for other online services/systems, these services and systems will not be effected.
引用
收藏
页码:958 / 963
页数:6
相关论文
共 50 条
  • [11] An Efficient Privacy-Preserving Authentication Scheme Based on Shamir Secret Sharing for VANETs
    Qi, Jiayu
    Gao, Tianhan
    Zhao, Cong
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2023, 2023, 177 : 138 - 148
  • [12] Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
    Abdel Hakeem, Shimaa A.
    Kim, HyungWon
    SENSORS, 2022, 22 (01)
  • [13] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [14] Securing graph steganography by using Shamir's secret sharing
    Sari, A. N.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [15] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [16] Secrecy Computation without Changing Polynomial Degree in Shamir's (K, N) Secret Sharing Scheme
    Shingu, Takeshi
    Iwamura, Keiichi
    Kaneda, Kitahiro
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 89 - 94
  • [17] Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing
    Wang, Zhen
    Karpovsky, Mark
    Bu, Lake
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2443 - 2455
  • [18] Efficient Computation Method of Participants' Weights in Shamir's Secret Sharing
    Li, Long
    Gu, Tianlong
    Chang, Liang
    Li, Jingjing
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 598 - 605
  • [19] Secret Sharing: Secure Password Sharing Technique
    Vyas, Hardik A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 731 - 735
  • [20] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63