The most frequently used authentication methods is based on short secrets, where usually the hash of the secrets are stored in a central database. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. In this paper we propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology on server side. To show that the proposed protocol is provably secure, we introduce the threshold hybrid corruption model.

Authors: Andrea Huszti, Oláh Norbert

Published in: ICITST-WorldCIS-WCST-WCICSS-2019 Proceedings

  • Date of Conference: 9-11 December 2019
  • DOI: 10.20533/ICITST.WorldCIS.WCST.WCICSS.2019.0010
  • ISBN: 978-1-913572-06-8
  • Conference Location: London, UK