Authentication as A Service Based on Shamir Secret Sharing

被引:0
|
作者
Bissoli, Andrea [1 ]
d'Amore, Fabrizio [1 ]
机构
[1] Sapienza Univ Rome, Dept Comp Control & Management Engn, Rome, Italy
关键词
Authentication; Shamir Secret Sharing; Authentication as a service; Application security;
D O I
10.1109/ISCSIC54682.2021.00072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a solution for securing the classical password-based authentication scheme, because in many cases this type of authentication is given as a requirement. Our solution is based on the well-known (k,n) threshold scheme of Shamir for sharing a secret, where in our case the secret is the password itself and (k, n) threshold scheme means that n password-derived secrets (shares) are created and k <= n shares are necessary and sufficient for reconstructing the password, while k - 1 are not sufficient. The scheme is information-theoretic secure. We improve the approach so that the password is one-time. Since each of the n shares is stored on a different host (Shareholder), an attacker will need to compromise k different Shareholders for obtaining an amount of data sufficient for reconstructing the secret. Furthermore, to be resistant to the compromising of the server (Dealer) coordinating the Shareholders, we define a variant of the classic Shamir, where the Shamir's abscissas are unknown to Dealer and Shareholders, making the reconstruction impossible even in the case of Dealer and Shareholders compromised. In addition, we apply the Pedersen method for allowing the verification of shares. For the described scenario we have designed two protocols allowing the communication between application, Dealer and Shareholders, so that the relevant players can participate in the phases of registration (users sign-up, to be carried out once), and of authentication (users login). We analyse several scenarios where Dealer and/or Shareholders are partially/totally compromised and confirm that none of them is enabling the attacker to break the authentication. Furthermore we focus on cases where one or more byzantine servers are presented, analysing the impact on the authentication and show the adopted mechanisms to be secure against these kinds of attacks. We have developed a prototype demonstrating that our method works correctly, effectively and efficiently. It provides a first feasibility study that will provide a base for structured and engineered cloud-based implementations aiming at providing what we call an authentication-as-a-service.
引用
收藏
页码:368 / 373
页数:6
相关论文
共 50 条
  • [1] Shamir's Secret Sharing for Authentication without Reconstructing Password
    Gupta, Kishor Datta
    Rahman, Md Lutfar
    Dasgupta, Dipankar
    Poudyal, Subash
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 958 - 963
  • [2] Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
    Abdel Hakeem, Shimaa A.
    Kim, HyungWon
    [J]. SENSORS, 2022, 22 (01)
  • [3] Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach
    Bansal, Gaurang
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3598 - 3610
  • [4] Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir's Secret Sharing
    Chen, Shuai
    Li, Bing
    Chen, Ziheng
    Zhang, Yan
    Wang, Caicai
    Tao, Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (16): : 14408 - 14425
  • [5] Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
    Nakkar, Mouna
    Altawy, Riham
    Youssef, Amr
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3412 - 3429
  • [6] AuSDiDe: Towards a New Authentication System for Distributed and Decentralized Structure based on Shamir's Secret Sharing
    Sefraoui, Omar
    Bouzidi, Afaf
    Ghoumid, Kamal
    Ar-Reyouchi, El Miloud
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 782 - 787
  • [7] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [8] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
  • [9] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [10] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217