Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs

被引:1
|
作者
Nakkar, Mouna [1 ]
Altawy, Riham [2 ]
Youssef, Amr [1 ]
机构
[1] Concordia Inst Informat Syst Engn, Montreal, PQ H3G 0A2, Canada
[2] Univ Victoria, Victoria, BC V8P 5C2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication; Cryptography; Physical unclonable function; Protocols; Proposals; Servers; Impersonation attacks; Edge computing; group authentication; physical unclonable function (PUF); secret sharing;
D O I
10.1109/TNSE.2024.3373386
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the proliferation of edge-computing (EC), Internet-of-things (IoT), and smart applications, many challenging security scenarios arise. For example, a common scenario in the edge-computing paradigm is having many nodes requesting authentication from one edge-server. To this end, Group Authentication Schemes (GASs) were introduced recently in the literature. However, most of the proposed GAS are valid for one-time-authentication, lack of flexibility, and key-agreement feature. In this paper, we exploit the advantages of two security primitives, physically unclonable functions (PUFs) and Shamir's secret sharing scheme (SSS) to design a lightweight group authentication scheme (GAS) for edge-computing applications. Specifically, we apply PUFs on SSS and utilize the SSS-homomorphic property to achieve multiple-time group-authentications with the same set of shares. Our PUF-GAS scheme is lightweight, establishes a new group key-agreement per session, and supports efficient node-evicting mechanism. Furthermore, in PUF-GAS, the group nodes do not store any shares; instead, the nodes derive their secret-shares from their PUF-responses. We formally analyze our protocol theoretically and with AVISPA to show that our scheme achieves message secrecy and authenticity. Additionally, we evaluate our scheme in terms of storage, computational complexity, and communication overhead. Specifically, we evaluate the cryptographic operations used in PUF-GAS on an Arduino-Mega, an 8-bit RISC-based ATmega2560 micro-controller. Finally, we present a comparative evaluation of our scheme with others in terms of security and performance.
引用
收藏
页码:3412 / 3429
页数:18
相关论文
共 50 条
  • [1] Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing
    Chen, Shuai
    Li, Bing
    Chen, Ziheng
    Zhang, Yan
    Wang, Caicai
    Tao, Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16) : 14408 - 14425
  • [2] Several generalizations of Shamir's secret sharing scheme
    Lai, CP
    Ding, CS
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2004, 15 (02) : 445 - 458
  • [3] Shamir's Secret Sharing for Authentication without Reconstructing Password
    Gupta, Kishor Datta
    Rahman, Md Lutfar
    Dasgupta, Dipankar
    Poudyal, Subash
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 958 - 963
  • [4] Protecting AES with Shamir's Secret Sharing Scheme
    Goubin, Louis
    Martinelli, Ange
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 79 - 94
  • [5] Authentication as A Service Based on Shamir Secret Sharing
    Bissoli, Andrea
    d'Amore, Fabrizio
    [J]. 2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
  • [6] Secret Sharing Scheme for Group Authentication - A Review
    Narad, S. K.
    Sayankar, M. R.
    Alone, S. V.
    Mahiskar, P. S.
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 12 - 16
  • [7] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [8] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [9] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [10] A Modified Shamir Secret Sharing Scheme With Efficient Encoding
    Hineman, Allyson
    Blaum, Mario
    [J]. IEEE COMMUNICATIONS LETTERS, 2022, 26 (04) : 758 - 762