Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing

被引:9
|
作者
Falamas, Diana-Elena [1 ]
Marton, Kinga [1 ]
Suciu, Alin [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Comp Sci, Cluj Napoca 400114, Romania
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 05期
关键词
password-based authentication; iris-based authentication; secure multiparty computation; secret sharing;
D O I
10.3390/sym13050894
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secure authentication is an essential mechanism required by the vast majority of computer systems and various applications in order to establish user identity. Credentials such as passwords and biometric data should be protected against theft, as user impersonation can have serious consequences. Some practices widely used in order to make authentication more secure include storing password hashes in databases and processing biometric data under encryption. In this paper, we propose a system for both password-based and iris-based authentication that uses secure multiparty computation (SMPC) protocols and Shamir secret sharing. The system allows secure information storage in distributed databases and sensitive data is never revealed in plaintext during the authentication process. The communication between different components of the system is secured using both symmetric and asymmetric cryptographic primitives. The efficiency of the used protocols is evaluated along with two SMPC specific metrics: The number of communication rounds and the communication cost. According to our results, SMPC based on secret sharing can be successfully integrated in real-word authentication systems and the communication cost has an important impact on the performance of the SMPC protocols.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities
    Sucasas, Victor
    Aly, Abdelrahaman
    Mantas, Georgios
    Rodriguez, Jonathan
    Aaraj, Najwa
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3555 - 3572
  • [42] Secure and Privacy-preserving Biometrics based Active Authentication
    Sui, Yan
    Zou, Xukai
    Du, Eliza Y.
    Li, Feng
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1291 - 1296
  • [43] Multiparty quantum secret sharing of secure direct communication using single photons
    Han, Lian-Fang
    Liu, Yi-Min
    Liu, Jun
    Zhang, Zhan-Jun
    OPTICS COMMUNICATIONS, 2008, 281 (09) : 2690 - 2694
  • [44] Efficient privacy preserving distributed clustering based on secret sharing
    Kaya, Selim V.
    Pedersen, Thomas B.
    Savas, Erkay
    Saygin, Yuecel
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 280 - 291
  • [45] Privacy preserving sequential pattern mining based on secure two-party computation
    Ouyang, Wei-Min
    Huang, Qin-Hua
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
  • [46] Privacy preserving association rules mining based on secure two-party computation
    Ouyang, Weimin
    Huang, Qinhua
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
  • [47] An efficient and secure multiparty quantum secret sharing scheme based on single photons
    Wang, Tian-yin
    Wen, Qiao-yan
    Chen, Xiu-bo
    Guo, Fen-zhuo
    Zhu, Fu-chen
    OPTICS COMMUNICATIONS, 2008, 281 (24) : 6130 - 6134
  • [48] Enhancing Security and Privacy in Biometrics Based Authentication System Using Multiple Secret Sharing
    Patil, Sonali
    Tajane, Kapil
    Sirdeshpande, Janhavi
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 190 - 194
  • [49] Design and Implementation of Secure Biometric Based Authentication System using RFID and Secret Sharing
    Patil, Sonali
    Dhumal, Priyanka
    Lokhande, Shweta
    Kamble, Trishala
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 480 - 482
  • [50] A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing
    Liu, Yun
    Cheng, Zi-Yao
    Chang, Chin-Chen
    Zhang, Zhen-Jiang
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 463 - 469