Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation

When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentic...

Full description

Saved in:
Bibliographic Details
Main Authors: Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10829920/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832592918298230784
author Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal
author_facet Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal
author_sort Keiichi Iwamura
collection DOAJ
description When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentication; however, with the development of quantum computers they are highly likely to be deciphered. Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. Therefore, this study suggests the implementation of user authentication and secure communication that guarantees information-theoretic security through the use of secure computation based on a computationally lightweight <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula>-threshold secret sharing scheme. In this study, a user authentication system is proposed with information-theoretical security that utilizes constantly changing information. Subsequently, it is demonstrated that secure communication with information-theoretic security can be achieved without the need to distribute a substantial number of true random numbers by employing secure computation based on <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula>-threshold secret sharing. The proposed methods are suitable for implementation in IoT environments because they require minimal processing overhead. The practical application of the proposed methods are also demonstrated through an implementation using C++. For example, the average execution time of the claimant was less than 0.1 [ms], proving that the proposed methods are very efficient.
format Article
id doaj-art-3b7a71a1998f49548bcb1a7985c0e061
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-3b7a71a1998f49548bcb1a7985c0e0612025-01-21T00:01:39ZengIEEEIEEE Access2169-35362025-01-01139015903110.1109/ACCESS.2025.352663210829920Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure ComputationKeiichi Iwamura0Ahmad Akmal Aminuddin Mohd Kamal1https://orcid.org/0000-0002-7941-3021Department of Electrical Engineering, Tokyo University of Science, Tokyo, JapanDepartment of Information and Computer Technology, Tokyo University of Science, Tokyo, JapanWhen using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentication; however, with the development of quantum computers they are highly likely to be deciphered. Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. Therefore, this study suggests the implementation of user authentication and secure communication that guarantees information-theoretic security through the use of secure computation based on a computationally lightweight <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula>-threshold secret sharing scheme. In this study, a user authentication system is proposed with information-theoretical security that utilizes constantly changing information. Subsequently, it is demonstrated that secure communication with information-theoretic security can be achieved without the need to distribute a substantial number of true random numbers by employing secure computation based on <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula>-threshold secret sharing. The proposed methods are suitable for implementation in IoT environments because they require minimal processing overhead. The practical application of the proposed methods are also demonstrated through an implementation using C++. For example, the average execution time of the claimant was less than 0.1 [ms], proving that the proposed methods are very efficient.https://ieeexplore.ieee.org/document/10829920/User authenticationidentificationsecret sharingsecure computationtwo-party computationinsecure channel
spellingShingle Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
IEEE Access
User authentication
identification
secret sharing
secure computation
two-party computation
insecure channel
title Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
title_full Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
title_fullStr Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
title_full_unstemmed Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
title_short Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
title_sort secure user authentication with information theoretic security using secret sharing based secure computation
topic User authentication
identification
secret sharing
secure computation
two-party computation
insecure channel
url https://ieeexplore.ieee.org/document/10829920/
work_keys_str_mv AT keiichiiwamura secureuserauthenticationwithinformationtheoreticsecurityusingsecretsharingbasedsecurecomputation
AT ahmadakmalaminuddinmohdkamal secureuserauthenticationwithinformationtheoreticsecurityusingsecretsharingbasedsecurecomputation