An authentication protocol based on threshold secret sharing

被引:0
|
作者
Thuc, Nguyen Dinh
Bao, Tran Ngoc
机构
关键词
network security; WLAN security; authentication protocol;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Mutual authentication is vital concept to network security and incorporated to proprietary security solutions. In this paper, we present a new mutual authentication protocol based on the threshold secret sharing scheme of Shamir that can stop man-in-the-middle attacks, session highjacking and replay attacks. Although authentication protocol based on threshold secret sharing was motivated by WLAN security in the infrastructure mode, we believe that it can be modified for the adhoc mode in where each mobile node holds a partial secret and the nodes can collaborate with each other to authenticate a new node.
引用
收藏
页码:96 / 100
页数:5
相关论文
共 50 条
  • [31] A Threshold Secret Sharing Technique Based on Matrix Manipulation
    Porwal, Shardha
    Mittal, Sangeeta
    ADVANCEMENTS IN MATHEMATICS AND ITS EMERGING AREAS, 2020, 2214
  • [32] Threshold visual secret sharing based on Boolean operations
    Kumar, Sachin
    Sharma, Rajendra K.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 653 - 664
  • [33] A self-authentication mechanism for a (3,3)-threshold secret sharing scheme
    Chen, Yi-Hui
    Lan, Ci-Wei
    2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 1006 - 1008
  • [34] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [35] Threshold quantum secret sharing based on single qubit
    Changbin Lu
    Fuyou Miao
    Keju Meng
    Yue Yu
    Quantum Information Processing, 2018, 17
  • [36] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [37] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    International Journal of Network Security, 2014, 16 (04) : 249 - 255
  • [38] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [39] Hierarchical threshold secret sharing
    Tassa, Tamir
    JOURNAL OF CRYPTOLOGY, 2007, 20 (02) : 237 - 264
  • [40] Hierarchical Threshold Secret Sharing
    Tamir Tassa
    Journal of Cryptology, 2007, 20 : 237 - 264