Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing

被引:9
|
作者
Falamas, Diana-Elena [1 ]
Marton, Kinga [1 ]
Suciu, Alin [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Comp Sci, Cluj Napoca 400114, Romania
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 05期
关键词
password-based authentication; iris-based authentication; secure multiparty computation; secret sharing;
D O I
10.3390/sym13050894
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secure authentication is an essential mechanism required by the vast majority of computer systems and various applications in order to establish user identity. Credentials such as passwords and biometric data should be protected against theft, as user impersonation can have serious consequences. Some practices widely used in order to make authentication more secure include storing password hashes in databases and processing biometric data under encryption. In this paper, we propose a system for both password-based and iris-based authentication that uses secure multiparty computation (SMPC) protocols and Shamir secret sharing. The system allows secure information storage in distributed databases and sensitive data is never revealed in plaintext during the authentication process. The communication between different components of the system is secured using both symmetric and asymmetric cryptographic primitives. The efficiency of the used protocols is evaluated along with two SMPC specific metrics: The number of communication rounds and the communication cost. According to our results, SMPC based on secret sharing can be successfully integrated in real-word authentication systems and the communication cost has an important impact on the performance of the SMPC protocols.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A Privacy-Preserving Ranking Protocol Based on Secure Multiparty Multiplication
    Zhong, Hong
    Qian, Xiaoqiang
    Zhang, Dalei
    Luo, Yonglong
    INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING BIOMEDICAL ENGINEERING, AND INFORMATICS (SPBEI 2013), 2014, : 1040 - 1050
  • [32] PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation
    Tawfik, Ahmed M.
    Al-Ahwal, Ayman
    Eldien, Adly S. Tag
    Zayed, Hala H.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (03):
  • [33] A database privacy information query protocol based on secure multiparty computation
    Zhang, T. (Zhangtao2668@126.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06):
  • [34] Privacy of Federated QR Decomposition Using Additive Secure Multiparty Computation
    Hartebrodt, Anne
    Rottger, Richard
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5122 - 5132
  • [35] Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing
    Kaur, Harkeerat
    Khanna, Pritee
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 30 - 41
  • [36] Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing
    Wang, Huiyong
    Luo, Mingjun
    Ding, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] Privacy-Preserving Secure Multiparty Computation on Electronic Medical Records for Star Exchange Topology
    Ahmed M. Tawfik
    Sahar F. Sabbeh
    Tarek EL-Shishtawy
    Arabian Journal for Science and Engineering, 2018, 43 : 7747 - 7756
  • [38] Privacy-Preserving Secure Multiparty Computation on Electronic Medical Records for Star Exchange Topology
    Tawfik, Ahmed M.
    Sabbeh, Sahar F.
    El-Shishtawy, Tarek
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7747 - 7756
  • [39] Secure and Privacy Preserving Biometric Authentication Using Watermarking Technique
    Pal, Doyel
    Khethavath, Praveenkumar
    Thomas, Johnson P.
    Chen, Tingting
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 146 - 156
  • [40] Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation
    Wei, Weiming
    Tang, Chunming
    Chen, Yucheng
    ENTROPY, 2022, 24 (08)