Secret Sharing-based Authenticated Key Agreement Protocol
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F21%3APU141158" target="_blank" >RIV/00216305:26220/21:PU141158 - isvavai.cz</a>
Result on the web
<a href="https://dl.acm.org/doi/10.1145/3465481.3470057" target="_blank" >https://dl.acm.org/doi/10.1145/3465481.3470057</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1145/3465481.3470057" target="_blank" >10.1145/3465481.3470057</a>
Alternative languages
Result language
angličtina
Original language name
Secret Sharing-based Authenticated Key Agreement Protocol
Original language description
In this article, we present two novel authenticated key agreement (AKA) schemes that are easily implementable and efficient even onconstrained devices. Both schemes are constructed over elliptic curves and extend Schonorr’s signature of knowledge protocol. To thebest of our knowledge, we introduce a first AKA protocol based on the proof of knowledge concept. This concept allows a client toprove its identity to a server via secret information while the server can learn nothing about the secret. Furthermore, we extend ourprotocol via secret sharing to support client multi-device authentication and multi-factor authentication features. In particular, thesecret of the client can be distributed among the client’s devices.The experimental analysis shows that our secret sharing AKA (SSAKA) can establish a secure communication channel in less than600 ms for one secondary device and 128-bit security strength. The protocol is fast even on very constrained secondary devices, wherein most of cases takes less than 500 ms. Note that the time consumption depends on the computational capabilities of the hardware.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
20203 - Telecommunications
Result continuities
Project
<a href="/en/project/TM02000036" target="_blank" >TM02000036: Artificial Intelligence for Practice</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2021
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
International Workshop on Security and Privacy in Intelligent Infrastructures (SP2I 2021) at the 16th International Conference on Availability (ARES 2021).
ISBN
978-1-4503-9051-4
ISSN
—
e-ISSN
—
Number of pages
10
Pages from-to
1-10
Publisher name
Neuveden
Place of publication
neuveden
Event location
All-Digital Conference
Event date
Aug 17, 2021
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000749539200101