Font Size: a A A

Group Authentication Based On Secure Secret Sharing

Posted on:2016-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:H W JiangFull Text:PDF
GTID:2348330473963410Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
User authentication is one of the main points of the information security.In order to ensure the system,one to one user authentication is used.With the development of network applications,some applications group oriented,such as web conferencing,electronic auction and distributed access control systems,often require a quick and efficient authentication for all participants to determine whether all users belong to the same group,which resulting in a group authentication.The traditional group authentication is relatively low in efficiency,which needs to be further improved.Therefore,based on the secure secret sharing,we analyze and do research on group authentication scheme in depth.First,we analyze the secure secret sharing scheme,which has the ability of resisting the attack of malicious participants.In order to solve this problem,this paper introduce a way by using random component to hidden the real share during the recovery of the secret.Secondly,we analyze of the deficiencies of the existing classical user authentication and group authentication scheme,it is mainly existed that low efficiency in using.In the traditional one to one user authentication,authenticating time increases with the number of users' number.In the scheme based on public key system,is of high complexity in computation.And the way based on the(t,n)threshold secret sharing scheme,it has asynchronous attack,complex or participants need to retain too many tokens.In order to solve the current problem,we propose an authentication scheme based on secure secret sharing.Thirdly,based on the single group authentication,this paper study the multi secret sharing scheme,raise a scheme called multi-group authentication schemes because weather success or failure of authentication in single group authentication,the token cannot be used again.Especially in some scenes,need for repeated authentication,the single group authentication cannot satisfy the need.Finally,we has carried on the summary,the scheme we proposed is not only efficient to solve group authentication in simple,safe and fast for a group of user authentication,but also extend it to multi group certification especially for those applications which need repeatedly group certification application.
Keywords/Search Tags:User authentication, Secret sharing, CRT, Asynchronous attack, Group authentication
PDF Full Text Request
Related items