An authentication protocol based on threshold secret sharing

被引:0
|
作者
Thuc, Nguyen Dinh
Bao, Tran Ngoc
机构
关键词
network security; WLAN security; authentication protocol;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on the threshold secret sharing scheme of Shamir that can stop man-in-the-middle attacks, session highjacking and replay attacks. Although authentication protocol based on threshold secret sharing was motivated by WLAN security in the infrastructure mode, we believe that it can be modified for the adhoc mode in where each mobile node holds a partial secret and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:96 / 100
页数:5
相关论文
共 50 条
  • [21] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106
  • [22] A Secure Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Sarvabhatla, Mrudula
    Giri, M.
    Vorugunti, Chandra Sekhar
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 9 - 16
  • [23] Key Sharing Scheme based on One Weighted Threshold Secret Sharing
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryou, JaeCheo
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 317 - 320
  • [24] RFID mutual authentication protocol based on synchronized secret
    Kim, H. (kim@kiu.ac.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [25] Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing
    Chen, Lu
    Zhang, Xin
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [26] RFID Mutual Authentication Protocol based on Synchronized Secret
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 37 - 49
  • [27] A trusted multi-party authentication scheme based on proactive-ElGamal threshold secret sharing system
    Yang Yu-guang
    Chai Hai-ping
    ADVANCES IN COMPUTING, CONTROL AND INDUSTRIAL ENGINEERING, 2012, 235 : 20 - 24
  • [28] Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments
    Lee, Dae-Hwi
    Lee, Im-Yeong
    SENSORS, 2018, 18 (10)
  • [29] Multi-Factor One-Way Authentication and Key Retrieval Based on Ideal Threshold Secret Sharing
    Shenets, N.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2020, 23 (01): : 54 - 65
  • [30] Threshold quantum secret sharing based on single qubit
    Lu, Changbin
    Miao, Fuyou
    Meng, Keju
    Yu, Yue
    QUANTUM INFORMATION PROCESSING, 2018, 17 (03)