An authentication protocol based on threshold secret sharing

被引:0
|
作者
Thuc, Nguyen Dinh
Bao, Tran Ngoc
机构
关键词
network security; WLAN security; authentication protocol;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on the threshold secret sharing scheme of Shamir that can stop man-in-the-middle attacks, session highjacking and replay attacks. Although authentication protocol based on threshold secret sharing was motivated by WLAN security in the infrastructure mode, we believe that it can be modified for the adhoc mode in where each mobile node holds a partial secret and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:96 / 100
页数:5
相关论文
共 50 条
  • [1] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [2] Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
    Abdel Hakeem, Shimaa A.
    Kim, HyungWon
    SENSORS, 2022, 22 (01)
  • [3] A (t, n) threshold quantum secret sharing with authentication based on single photons
    Zhang, Jie
    Qin, Sujuan
    Jin, Zhengping
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [4] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [5] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [6] Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing
    Ye, Jun
    Cao, Xinhui
    Guo, Zhen
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [7] (t, m) Threshold quantum secret sharing with group authentication
    Mawlia, Priyanka
    Siwach, Vikash
    PHYSICA SCRIPTA, 2025, 100 (02)
  • [8] A Threshold-based Authentication System Which Provides Attributes Using Secret Sharing
    Ito, Tomohiro
    Kotani, Daisuke
    Okabe, Yasuo
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 730 - 737
  • [9] Authentication as A Service Based on Shamir Secret Sharing
    Bissoli, Andrea
    d'Amore, Fabrizio
    2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
  • [10] A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication
    Meng, Depeng
    Li, Zhihui
    Luo, Shuangshuang
    Han, Zhaowei
    ENTROPY, 2023, 25 (05)