JOURNAL ARTICLE

Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation

Keiichi IwamuraAhmad Akmal Aminuddin Mohd Kamal

Year: 2025 Journal:   IEEE Access Vol: 13 Pages: 9015-9031   Publisher: Institute of Electrical and Electronics Engineers

Abstract

When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentication; however, with the development of quantum computers they are highly likely to be deciphered. Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. Therefore, this study suggests the implementation of user authentication and secure communication that guarantees information-theoretic security through the use of secure computation based on a computationally lightweight $(k,n)$ -threshold secret sharing scheme. In this study, a user authentication system is proposed with information-theoretical security that utilizes constantly changing information. Subsequently, it is demonstrated that secure communication with information-theoretic security can be achieved without the need to distribute a substantial number of true random numbers by employing secure computation based on $(k,n)$ -threshold secret sharing. The proposed methods are suitable for implementation in IoT environments because they require minimal processing overhead. The practical application of the proposed methods are also demonstrated through an implementation using C++. For example, the average execution time of the claimant was less than 0.1 [ms], proving that the proposed methods are very efficient.

Keywords:
Computer science Secure multi-party computation Computer security Secret sharing Authentication (law) Pre-shared key Secure two-party computation Message authentication code Cryptography Information security Computer network Public-key cryptography Key distribution Encryption

Metrics

5
Cited By
23.87
FWCI (Field Weighted Citation Impact)
63
Refs
0.97
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Secret Sharing based Secure Authentication System

Rupali S. PatilSonali PatilSudeep D. Thepade

Journal:   International Journal of Computer Applications Year: 2015 Vol: 118 (22)Pages: 8-11
JOURNAL ARTICLE

A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing

Yun LiuZi‐Yao ChengC. C. ChangZhenjiang Zhang

Journal:   網際網路技術學刊 Year: 2012 Vol: 13 (3)Pages: 463-469
JOURNAL ARTICLE

Information-theoretic secure verifiable secret sharing over RSA modulus

Gang QiuHong WangShimin WeiXiao Guo-zhen

Journal:   Wuhan University Journal of Natural Sciences Year: 2006 Vol: 11 (6)Pages: 1849-1852
BOOK-CHAPTER

Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing

Torben Pryds Pedersen

Lecture notes in computer science Year: 2007 Pages: 129-140
© 2026 ScienceGate Book Chapters — All rights reserved.