Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing

被引:9
作者
Falamas, Diana-Elena [1 ]
Marton, Kinga [1 ]
Suciu, Alin [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Comp Sci, Cluj Napoca 400114, Romania
来源
SYMMETRY-BASEL | 2021年 / 13卷 / 05期
关键词
password-based authentication; iris-based authentication; secure multiparty computation; secret sharing;
D O I
10.3390/sym13050894
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secure authentication is an essential mechanism required by the vast majority of computer systems and various applications in order to establish user identity. Credentials such as passwords and biometric data should be protected against theft, as user impersonation can have serious consequences. Some practices widely used in order to make authentication more secure include storing password hashes in databases and processing biometric data under encryption. In this paper, we propose a system for both password-based and iris-based authentication that uses secure multiparty computation (SMPC) protocols and Shamir secret sharing. The system allows secure information storage in distributed databases and sensitive data is never revealed in plaintext during the authentication process. The communication between different components of the system is secured using both symmetric and asymmetric cryptographic primitives. The efficiency of the used protocols is evaluated along with two SMPC specific metrics: The number of communication rounds and the communication cost. According to our results, SMPC based on secret sharing can be successfully integrated in real-word authentication systems and the communication cost has an important impact on the performance of the SMPC protocols.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
    Geng, Tieming
    Njilla, Laurent
    Huang, Chin-Tser
    NETWORK, 2022, 2 (01): : 66 - 80
  • [2] A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation
    von Maltitz, Marcel
    Carle, Georg
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 : 355 - 372
  • [3] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [4] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [5] Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation
    Resende, Amanda
    Railsback, Davis
    Dowsley, Rafael
    Nascimento, Anderson C. A.
    Aranha, Diego E.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 428 - 442
  • [6] Performance Impact Analysis of Rounds and Amounts of Communication in Secure Multiparty Computation Based on Secret Sharing
    Falamas, Diana-Elena
    Marton, Kinga
    2019 18TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2019,
  • [7] Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    IEEE ACCESS, 2025, 13 : 9015 - 9031
  • [8] Privacy-preserving record linkage in large databases using secure multiparty computation
    Peeter Laud
    Alisa Pankova
    BMC Medical Genomics, 11
  • [9] Privacy-preserving record linkage in large databases using secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    BMC MEDICAL GENOMICS, 2018, 11
  • [10] Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation
    Olalia, Romulo L., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 209 - 219