All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Secret Sharing-based Authenticated Key Agreement Protocol

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F21%3APU141158" target="_blank" >RIV/00216305:26220/21:PU141158 - isvavai.cz</a>

  • Result on the web

    <a href="https://dl.acm.org/doi/10.1145/3465481.3470057" target="_blank" >https://dl.acm.org/doi/10.1145/3465481.3470057</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1145/3465481.3470057" target="_blank" >10.1145/3465481.3470057</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Secret Sharing-based Authenticated Key Agreement Protocol

  • Original language description

    In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even onconstrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge protocol. To thebest of our knowledge, we introduce a first AKA protocol based on the proof of knowledge concept. This concept allows a client toprove its identity to a server via secret information while the server can learn nothing about the secret. Furthermore, we extend ourprotocol via secret sharing to support client multi-device authentication and multi-factor authentication features. In particular, thesecret of the client can be distributed among the client’s devices.The experimental analysis shows that our secret sharing AKA (SSAKA) can establish a secure communication channel in less than600 ms for one secondary device and 128-bit security strength. The protocol is fast even on very constrained secondary devices, wherein most of cases takes less than 500 ms. Note that the time consumption depends on the computational capabilities of the hardware.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/TM02000036" target="_blank" >TM02000036: Artificial Intelligence for Practice</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2021

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2021) at the 16th International Conference on Availability (ARES 2021).

  • ISBN

    978-1-4503-9051-4

  • ISSN

  • e-ISSN

  • Number of pages

    10

  • Pages from-to

    1-10

  • Publisher name

    Neuveden

  • Place of publication

    neuveden

  • Event location

    All-Digital Conference

  • Event date

    Aug 17, 2021

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000749539200101