The most frequently used authentication methods is based on short secrets, where usually the hash of the secrets are stored in a central database. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. In this paper we propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology on server side. To show that the proposed protocol is provably secure, we introduce the threshold hybrid corruption model.

Published in: World Congress on Sustainable Technologies (WCST-2019)

  • Date of Conference: 9-11 December 2019
  • DOI: 10.2053/ICITST.WorldCIS.WCST.WCICSS.2019.0010
  • ISBN: 978-1-913572-06-8
  • Conference Location: London, UK