RMIT University
Browse

Efficient threshold password-authenticated secret sharing protocols for cloud computing

journal contribution
posted on 2024-11-02, 10:55 authored by Xun YiXun Yi, Zahir TariZahir Tari, Feng Hao, Liqun Chen, Joseph Liu, Terry Yang, Kwok Lam, Ibrahim KhalilIbrahim Khalil, Albert Zomaya
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw, so that the client can later recover the secret s from any subset of t of the servers using the password pw. In this paper, we present two efficient TPASS protocols, one is built on two-phase commitment and has lower computation complexity, and another is based on zero-knowledge proof and has less communication rounds. Both protocols are in particular efficient for the client, who only needs to send a request and receive a response. In addition, we have provided rigorous proofs of security for the proposed protocols in the standard model. The experimental results have shown that the proposed two TPASS protocols are more efficient than Camenisch et al.’s protocols and save up to 85%–95% total computational time and up to 65%–75% total communication overhead.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1016/j.jpdc.2019.01.013
  2. 2.
    ISSN - Is published in 07437315

Journal

Journal of Parallel and Distributed Computing

Volume

128

Start page

57

End page

70

Total pages

14

Publisher

Academic Press

Place published

United States

Language

English

Copyright

© 2019 Elsevier Inc.

Former Identifier

2006091785

Esploro creation date

2020-06-22

Fedora creation date

2019-08-06

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC