Shamir's Secret Sharing for Authentication without Reconstructing Password

被引:0
|
作者
Gupta, Kishor Datta [1 ]
Rahman, Md Lutfar [1 ]
Dasgupta, Dipankar [1 ]
Poudyal, Subash [1 ]
机构
[1] Univ Memphis, Dept CS, Memphis, TN 38152 USA
关键词
Shamir's secret sharing; Security; Threshold cryptography; Authentication; Password;
D O I
10.1109/ccwc47524.2020.9031270
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Shamir's Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharing. But it can also be used for authentication protocols as a replacement of hashing. In this paper, we propose an authentication protocol which will use Shamir's secret sharing method to authenticate with server. Hashing may not be able to hide data as effective in post quantum era. So in post quantum era, if any data server get exposed, users credentials can be also compromised as they were hidden by using hashing as an one way encryption. Our protocol will be able to solve this problem in a way that complete data exposure from server will not reveal the actual password provided by the user. So, even if the user uses same password for other online services/systems, these services and systems will not be effected.
引用
收藏
页码:958 / 963
页数:6
相关论文
共 50 条
  • [21] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [22] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [23] PASSWORD AUTHENTICATION WITHOUT USING A PASSWORD TABLE
    HORNG, GB
    INFORMATION PROCESSING LETTERS, 1995, 55 (05) : 247 - 250
  • [24] Password-Protected Secret Sharing
    Bagherzandi, Ali
    Jarecki, Stanislaw
    Saxena, Nitesh
    Lu, Yanbin
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 433 - 443
  • [25] An Entropy-based Demonstration of the Security of Shamir's Secret Sharing Scheme
    Corniaux, Christian L. F.
    Ghodosi, Hossein
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 45 - 47
  • [26] New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme
    Klein, Ohad
    Komargodski, Ilan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 139 - 170
  • [27] Password-protected Secret-sharing Schemes without Random Oracles
    Hasegawa, Shingo
    Isobe, Shuji
    Iwazaki, Jun-ya
    Koizumi, Eisuke
    Shizuya, Hiroki
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 566 - 570
  • [28] 3-D plane based extended Shamir’s secret sharing
    Agarwal A.
    Deshmukh M.
    International Journal of Information Technology, 2021, 13 (2) : 609 - 612
  • [29] Game on: a performance comparison of interpolation techniques applied to Shamir's secret sharing
    Voudouris, Anastassis
    Tressos, Aristomenis
    Zarras, Apostolis
    Xenakis, Christos
    COMPUTER JOURNAL, 2024,
  • [30] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76