A 3D Model Authentication Scheme Based on Secret Sharing in Cloud Environment

Author(s):  
Jianwei Zhang ◽  
Zuodong Wu ◽  
Hui Liang ◽  
Wenqian Wang
2018 ◽  
Vol 24 (3) ◽  
pp. 1046-1062 ◽  
Author(s):  
Marimuthu Karuppiah ◽  
Ashok Kumar Das ◽  
Xiong Li ◽  
Saru Kumari ◽  
Fan Wu ◽  
...  

2012 ◽  
Vol 235 ◽  
pp. 20-24
Author(s):  
Yu Guang Yang ◽  
Hai Ping Chai

In most existing authentication schemes users are authenticated by the server one by one which results in lower efficiency of authentication when the number of users is large. Aiming at the drawback, this paper propose an efficient trusted multi-party authentication scheme based on threshold secret sharing, the discrete logarithm problem and ElGamal cryptosystem. Using (t,n) threshold secret sharing idea, the paper propose a (t,n) threshold authentication scheme which can not only simultaneously authenticate t users satisfying some specific conditions, but also authenticate new users dynamically by distributing a new authentication key for the new user which was produced by t old users and the new user together. Finally, the security and efficiency of the proposed scheme are analyzed.


2010 ◽  
Vol 52 (2-3) ◽  
pp. 597-619 ◽  
Author(s):  
Shang-Lin Hsieh ◽  
I-Ju Tsai ◽  
Chung-Ping Yeh ◽  
Chia-Ming Chang

2021 ◽  
Author(s):  
Ahmed Bentajer ◽  
Mustapha Hedabou ◽  
Sara Ennaama ◽  
Abderrahim Tahiri

The aim of this paper is to propose a model to strengthen the security of key management in cloud computing, where the model is shared or entirely controlled by a non-trusted third party provider. Key management is not a straightforward matter for IT-teams, in addition to critical issues related to properly managing and securing the keys on providers’ infrastructures, they have to deal with concerns specific to multi-cloud key management. Hardware Security Module (HSM) solution that offers a secure on-premise encryption key management turned out be impracticable for widespread cloud deployment. HSM as a Service seems to be the best approach for key management in multi-cloud, but the service is wholly owned and managed by another cloud provider. In This paper, we present an efficient and secure cloud key management that fulfills the requirements of multi-cloud deployment. The proposed design splits the key into a blinded version of n shares that will be stored in encrypted format at the cloud provider side. To demonstrate the efficiency of the proposed design, we implement a fully featured prototype and evaluate its performance. Results analysis shows that the proposed design is highly efficient and can serve as a groundwork for using secret share as a way to protect keys in a multi-cloud environment.


Sign in / Sign up

Export Citation Format

Share Document