Secret Sharing-based Authenticated Key Agreement Protocol

التفاصيل البيبلوغرافية
العنوان: Secret Sharing-based Authenticated Key Agreement Protocol
المؤلفون: Raul Casanova Marques, Sara Ricci, Petr Cika, Petr Dzurenda, Jan Hajny
المصدر: The 16th International Conference on Availability, Reliability and Security
ARES
بيانات النشر: Zenodo, 2021.
سنة النشر: 2021
مصطلحات موضوعية: authenticated key agreement, Authentication, cryptography, business.industry, Computer science, 020208 electrical & electronic engineering, access control, Proof of knowledge, 020206 networking & telecommunications, Access control, Cryptography, 02 engineering and technology, security, Secret sharing, internet of things, wearables, proof of knowledge, 0202 electrical engineering, electronic engineering, information engineering, Key (cryptography), Identity (object-oriented programming), authentication, constrained devices, business, Protocol (object-oriented programming), Computer network
الوصف: In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even on constrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge protocol. To the best of our knowledge, we introduce a first AKA protocol based on the proof of knowledge concept. This concept allows a client to prove its identity to a server via secret information while the server can learn nothing about the secret. Furthermore, we extend our protocol via secret sharing to support client multi-device authentication and multi-factor authentication features. In particular, the secret of the client can be distributed among the client’s devices. The experimental analysis shows that our secret sharing AKA (SSAKA) can establish a secure communication channel in less than 600 ms for one secondary device and 128-bit security strength. The protocol is fast even on very constrained secondary devices, where in most of cases takes less than 500 ms. Note that the time consumption depends on the computational capabilities of the hardware.
اللغة: English
ردمك: 978-1-4503-9051-4
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1f6e9085db0086eb0f604b86e5d0ee6d
https://zenodo.org/record/5504118
حقوق: OPEN
رقم الأكسشن: edsair.doi.dedup.....1f6e9085db0086eb0f604b86e5d0ee6d
قاعدة البيانات: OpenAIRE