Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470057
|View full text |Cite
|
Sign up to set email alerts
|

Secret Sharing-based Authenticated Key Agreement Protocol

Abstract: LicenseThis publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited. Take down policyIf you believe that this document breaches copyright, please contact the authors, and we will investigate your claim. BibTex entry@inproceedings{BUT171975, author="Petr {Dzurenda} and Sara {Ricci} and Raúl {Casanova-Marqués} and Jan {Hajný} and Petr {Číka}", title="Secret Sharing-based Authenticated Key Agreement Protocol", booktitle="International Workshop on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…The authors argued that this scheme allows users to authenticate even if some devices are compromised. Alongside, Dzurenda et al [8] proposed an authentication scheme where users confirm their identities to a server using a secret sharing scheme without leaving any clue to the server about the secret. The authors later extended this scheme to support user authentication from multiple devices by sharing the secret among users' devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors argued that this scheme allows users to authenticate even if some devices are compromised. Alongside, Dzurenda et al [8] proposed an authentication scheme where users confirm their identities to a server using a secret sharing scheme without leaving any clue to the server about the secret. The authors later extended this scheme to support user authentication from multiple devices by sharing the secret among users' devices.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, attaining the goal of user authentication from multiple devices makes authentication mechanisms in an IoT environment more challenging. Here to mention that some recent works [8][9][10] proposed multi-device user authentication mechanisms to validate users when they require services from a central server. Besides, these scheme enlist all the user's devices beforehand to the authentication process.…”
Section: Introductionmentioning
confidence: 99%
“…In our case, we use MultOS smart card. The authentication protocol is based on AKA protocol [2] and allows us to perform two factor authentication, namely: 1) possession (i.e., smart phone) and knowledge (i.e., PIN code) or 2) possession (i.e., smart phone) and biometric (i.e., fingerprint). The general architecture of our access control system and the principle how the multi-factor authentication process works with smart phone is depicted in Figure 1.…”
Section: Multi-factor Access Control Systemmentioning
confidence: 99%
“…The general architecture of our access control system and the principle how the multi-factor authentication process works with smart phone is depicted in Figure 1. We refer to [2] for more details of AKA principles. We implemented applications for both Android phone and SAM module.…”
Section: Multi-factor Access Control Systemmentioning
confidence: 99%
See 1 more Smart Citation