Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication

Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols ha...

Full description

Bibliographic Details
Main Authors: Shimaa A. Abdel Hakeem, HyungWon Kim
Format: Article
Language:English
Published: MDPI AG 2022-01-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/22/1/331
_version_ 1797497598145200128
author Shimaa A. Abdel Hakeem
HyungWon Kim
author_facet Shimaa A. Abdel Hakeem
HyungWon Kim
author_sort Shimaa A. Abdel Hakeem
collection DOAJ
description Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol (HMAC). The proposed protocol allows the group manager to generate a master secret key for a group of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> vehicles and split this key into secret shares; each share is distributed securely to every group member. <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula>-of-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> vehicles must recombine their secret shares and recover the original secret key. The acceptance of the recovered key is based on the correctness of the received HMAC signature to verify the group manager’s identity and ensure the key confidentiality. The proposed protocol is unconditionally secure and unbreakable using infinite computing power as <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula>, or more than <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula> secret shares are required to reconstruct the key. In contrast, attackers with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi><mo>−</mo><mn>1</mn></mrow></semantics></math></inline-formula> secret shares cannot leak any information about the original secret key. Moreover, the proposed protocol reduces the computation cost due to using polynomial evaluation to generate the secret key and interpolation to recover the secret key, which is very simple and lightweight compared with the discrete logarithm computation cost in previous protocols. In addition, utilizing a trusted group manager that broadcasts some public information is important for the registered vehicles to reconstruct the key and eliminate secure channels between vehicles. The proposed protocol reduces the communication cost in terms of transmitted messages between vehicles from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>2</mn><mrow><mo>(</mo><mrow><mi>t</mi><mo>−</mo><mn>1</mn></mrow><mo>)</mo></mrow></mrow></semantics></math></inline-formula> messages in previous shared secret protocols to zero messages. Moreover, it reduces the received messages at vehicles from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>2</mn><mi>t</mi></mrow></semantics></math></inline-formula> to two messages. At the same time, it allows vehicles to store only a single secret share compared with other shared secret protocols that require storage of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula> secret shares. The proposed protocol security level outperforms the other shared secret protocols security, as it supports key authentication and confidentiality using HMAC that prevents attackers from compromising or faking the key.
first_indexed 2024-03-10T03:21:31Z
format Article
id doaj.art-d16b593a27464ff0abd28182816c9fc5
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T03:21:31Z
publishDate 2022-01-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-d16b593a27464ff0abd28182816c9fc52023-11-23T12:20:36ZengMDPI AGSensors1424-82202022-01-0122133110.3390/s22010331Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC AuthenticationShimaa A. Abdel Hakeem0HyungWon Kim1Mixed-Signal Integrated System Lab (MSIS), School of Electronics Engineering, Chungbuk National University, Cheongju 28644, KoreaMixed-Signal Integrated System Lab (MSIS), School of Electronics Engineering, Chungbuk National University, Cheongju 28644, KoreaMany group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol (HMAC). The proposed protocol allows the group manager to generate a master secret key for a group of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> vehicles and split this key into secret shares; each share is distributed securely to every group member. <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula>-of-<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>n</mi></mrow></semantics></math></inline-formula> vehicles must recombine their secret shares and recover the original secret key. The acceptance of the recovered key is based on the correctness of the received HMAC signature to verify the group manager’s identity and ensure the key confidentiality. The proposed protocol is unconditionally secure and unbreakable using infinite computing power as <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula>, or more than <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula> secret shares are required to reconstruct the key. In contrast, attackers with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi><mo>−</mo><mn>1</mn></mrow></semantics></math></inline-formula> secret shares cannot leak any information about the original secret key. Moreover, the proposed protocol reduces the computation cost due to using polynomial evaluation to generate the secret key and interpolation to recover the secret key, which is very simple and lightweight compared with the discrete logarithm computation cost in previous protocols. In addition, utilizing a trusted group manager that broadcasts some public information is important for the registered vehicles to reconstruct the key and eliminate secure channels between vehicles. The proposed protocol reduces the communication cost in terms of transmitted messages between vehicles from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>2</mn><mrow><mo>(</mo><mrow><mi>t</mi><mo>−</mo><mn>1</mn></mrow><mo>)</mo></mrow></mrow></semantics></math></inline-formula> messages in previous shared secret protocols to zero messages. Moreover, it reduces the received messages at vehicles from <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>2</mn><mi>t</mi></mrow></semantics></math></inline-formula> to two messages. At the same time, it allows vehicles to store only a single secret share compared with other shared secret protocols that require storage of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi></mrow></semantics></math></inline-formula> secret shares. The proposed protocol security level outperforms the other shared secret protocols security, as it supports key authentication and confidentiality using HMAC that prevents attackers from compromising or faking the key.https://www.mdpi.com/1424-8220/22/1/331Shamir secretkey generationkey reconstructionthreshold protocolsvehicular communicationHMAC authentication
spellingShingle Shimaa A. Abdel Hakeem
HyungWon Kim
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
Sensors
Shamir secret
key generation
key reconstruction
threshold protocols
vehicular communication
HMAC authentication
title Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
title_full Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
title_fullStr Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
title_full_unstemmed Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
title_short Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
title_sort centralized threshold key generation protocol based on shamir secret sharing and hmac authentication
topic Shamir secret
key generation
key reconstruction
threshold protocols
vehicular communication
HMAC authentication
url https://www.mdpi.com/1424-8220/22/1/331
work_keys_str_mv AT shimaaaabdelhakeem centralizedthresholdkeygenerationprotocolbasedonshamirsecretsharingandhmacauthentication
AT hyungwonkim centralizedthresholdkeygenerationprotocolbasedonshamirsecretsharingandhmacauthentication