Efficient threshold password-authenticated secret sharing protocols for cloud computing
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw, so that the client can later recover the secret s from any subset of t of the servers using the password pw. In this paper, we present two ef...
Saved in:
Main Authors: | , , , , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/142881 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-142881 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1428812021-01-29T01:02:55Z Efficient threshold password-authenticated secret sharing protocols for cloud computing Yi, Xun Tari, Zahir Hao, Feng Chen, Liqun Liu, Joseph K. Yang, Xuechao Lam, Kwok-Yan Khalil, Ibrahim Zomaya, Albert Y. School of Computer Science and Engineering Research Techno Plaza Engineering::Computer science and engineering Threshold Password-authenticated Secret Sharing Protocol ElGamal Encryption Scheme Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw, so that the client can later recover the secret s from any subset of t of the servers using the password pw. In this paper, we present two efficient TPASS protocols, one is built on two-phase commitment and has lower computation complexity, and another is based on zero-knowledge proof and has less communication rounds. Both protocols are in particular efficient for the client, who only needs to send a request and receive a response. In addition, we have provided rigorous proofs of security for the proposed protocols in the standard model. The experimental results have shown that the proposed two TPASS protocols are more efficient than Camenisch et al.’s protocols and save up to 85%–95% total computational time and up to 65%–75% total communication overhead. Accepted version 2020-07-06T09:19:09Z 2020-07-06T09:19:09Z 2019 Journal Article Yi, X., Tari, Z., Hao, F., Chen, L., Liu, J. K., Yang, X., . . . Zomaya, A. Y. (2019). Efficient threshold password-authenticated secret sharing protocols for cloud computing. Journal of Parallel and Distributed Computing, 128, 57-70. doi:10.1016/j.jpdc.2019.01.013 0743-7315 https://hdl.handle.net/10356/142881 10.1016/j.jpdc.2019.01.013 2-s2.0-85061959900 128 57 70 en Journal of Parallel and Distributed Computing © 2019 Elsevier Inc. All rights reserved. This paper was published in Journal of Parallel and Distributed Computing and is made available with permission of Elsevier Inc. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Threshold Password-authenticated Secret Sharing Protocol ElGamal Encryption Scheme |
spellingShingle |
Engineering::Computer science and engineering Threshold Password-authenticated Secret Sharing Protocol ElGamal Encryption Scheme Yi, Xun Tari, Zahir Hao, Feng Chen, Liqun Liu, Joseph K. Yang, Xuechao Lam, Kwok-Yan Khalil, Ibrahim Zomaya, Albert Y. Efficient threshold password-authenticated secret sharing protocols for cloud computing |
description |
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw, so that the client can later recover the secret s from any subset of t of the servers using the password pw. In this paper, we present two efficient TPASS protocols, one is built on two-phase commitment and has lower computation complexity, and another is based on zero-knowledge proof and has less communication rounds. Both protocols are in particular efficient for the client, who only needs to send a request and receive a response. In addition, we have provided rigorous proofs of security for the proposed protocols in the standard model. The experimental results have shown that the proposed two TPASS protocols are more efficient than Camenisch et al.’s protocols and save up to 85%–95% total computational time and up to 65%–75% total communication overhead. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Yi, Xun Tari, Zahir Hao, Feng Chen, Liqun Liu, Joseph K. Yang, Xuechao Lam, Kwok-Yan Khalil, Ibrahim Zomaya, Albert Y. |
format |
Article |
author |
Yi, Xun Tari, Zahir Hao, Feng Chen, Liqun Liu, Joseph K. Yang, Xuechao Lam, Kwok-Yan Khalil, Ibrahim Zomaya, Albert Y. |
author_sort |
Yi, Xun |
title |
Efficient threshold password-authenticated secret sharing protocols for cloud computing |
title_short |
Efficient threshold password-authenticated secret sharing protocols for cloud computing |
title_full |
Efficient threshold password-authenticated secret sharing protocols for cloud computing |
title_fullStr |
Efficient threshold password-authenticated secret sharing protocols for cloud computing |
title_full_unstemmed |
Efficient threshold password-authenticated secret sharing protocols for cloud computing |
title_sort |
efficient threshold password-authenticated secret sharing protocols for cloud computing |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/142881 |
_version_ |
1690658424268783616 |