Shamir's Secret Sharing for Authentication without Reconstructing Password

被引:0
|
作者
Gupta, Kishor Datta [1 ]
Rahman, Md Lutfar [1 ]
Dasgupta, Dipankar [1 ]
Poudyal, Subash [1 ]
机构
[1] Univ Memphis, Dept CS, Memphis, TN 38152 USA
关键词
Shamir's secret sharing; Security; Threshold cryptography; Authentication; Password;
D O I
10.1109/ccwc47524.2020.9031270
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Shamir's Secret sharing is a quantum attack proof algorithm and is used heavily for secret sharing. But it can also be used for authentication protocols as a replacement of hashing. In this paper, we propose an authentication protocol which will use Shamir's secret sharing method to authenticate with server. Hashing may not be able to hide data as effective in post quantum era. So in post quantum era, if any data server get exposed, users credentials can be also compromised as they were hidden by using hashing as an one way encryption. Our protocol will be able to solve this problem in a way that complete data exposure from server will not reveal the actual password provided by the user. So, even if the user uses same password for other online services/systems, these services and systems will not be effected.
引用
收藏
页码:958 / 963
页数:6
相关论文
共 50 条
  • [41] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme
    Ding, Wanmeng
    Liu, Kesheng
    Liu, Lintao
    Yan, Xuehu
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
  • [42] Proposal of a Secure Modbus RTU Communication with Adi Shamir's Secret Sharing Method
    Adamko, Eva
    Jakaboczki, Gabor
    Szemes, Peter Tamas
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (02) : 107 - 114
  • [43] Unconditional Secure Topology-hiding Broadcast Via Shamir's Secret Sharing
    Bo Mi
    Wu, Bingqing
    Kuang, Fengtian
    Huang darong
    Wu, Shijie
    Lin, Mengting
    PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 679 - 683
  • [44] Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
    Cheon, Jung Hee
    Cho, Wonhee
    Kim, Jiseung
    JOURNAL OF CRYPTOLOGY, 2025, 38 (01)
  • [45] Dynamic threshold and cheater resistance for Shamir secret sharing scheme
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 103 - 117
  • [46] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme
    Pundkar, Sumedh N.
    Shekokar, Narendra
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
  • [47] Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields
    Maji, Hemanta K.
    Nguyen, Hai H.
    Paskin-Cherniaysky, Anat
    Ye, Xiuyu
    ADVANCES IN CRYPTOLOGY, PT IV, EUROCRYPT 2024, 2024, 14654 : 286 - 315
  • [48] DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services
    Zhang, Songsong
    Yong, Xie
    Luo, Min
    He, Debiao
    Choo, Kim-Kwang Raymond
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 2172 - 2182
  • [49] Faulty share detection in Shamir's secret sharing (vol 15, pg 274, 2019)
    Uteshev, A. Yu.
    Marov, A. V.
    VESTNIK SANKT-PETERBURGSKOGO UNIVERSITETA SERIYA 10 PRIKLADNAYA MATEMATIKA INFORMATIKA PROTSESSY UPRAVLENIYA, 2020, 16 (02): : 218 - 218
  • [50] MS Excel-Based Application for Implementing the Cryptographic Algorithm Shamir's Secret Sharing
    Borodzhieva, A. N.
    2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, : 1611 - 1616