On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication

Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or...

Full description

Bibliographic Details
Main Authors: Sergey Bezzateev, Vadim Davydov, Aleksandr Ometov
Format: Article
Language:English
Published: MDPI AG 2020-12-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/4/34
id doaj-f3b844628d314eabb331dc2b879ac121
record_format Article
spelling doaj-f3b844628d314eabb331dc2b879ac1212020-12-02T00:00:33ZengMDPI AGCryptography2410-387X2020-12-014343410.3390/cryptography4040034On Secret Sharing with Newton’s Polynomial for Multi-Factor AuthenticationSergey Bezzateev0Vadim Davydov1Aleksandr Ometov2Technologies of Information Security, Saint Petersburg State University of Aerospace Instrumentation, 190000 St. Petersburg, RussiaFaculty of Secure Information Technologies, ITMO University, 197101 St. Petersburg, RussiaTampere University, 33720 Tampere, FinlandSecurity and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide the required levels of flexibility and pro-activity of the access procedures, thus, the concept of threshold-based multi-factor authentication (MFA) was introduced, in which some of the factors may be missing, but the access can still be granted. In turn, secret sharing is a crucial component of the MFA systems, with Shamir’s schema being the most widely known one historically and based on Lagrange interpolation polynomial. Interestingly, the older Newtonian approach to the same problem is almost left without attention. At the same time, it means that the coefficients of the existing secret polynomial do not need to be re-calculated while adding a new factor. Therefore, this paper investigates this known property of Newton’s interpolation formula, illustrating that, in specific MFA cases, the whole system may become more flexible and scalable, which is essential for future authentication systems.https://www.mdpi.com/2410-387X/4/4/34authenticationinterpolationNetwon’s polynomialsecret sharing
collection DOAJ
language English
format Article
sources DOAJ
author Sergey Bezzateev
Vadim Davydov
Aleksandr Ometov
spellingShingle Sergey Bezzateev
Vadim Davydov
Aleksandr Ometov
On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
Cryptography
authentication
interpolation
Netwon’s polynomial
secret sharing
author_facet Sergey Bezzateev
Vadim Davydov
Aleksandr Ometov
author_sort Sergey Bezzateev
title On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
title_short On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
title_full On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
title_fullStr On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
title_full_unstemmed On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication
title_sort on secret sharing with newton’s polynomial for multi-factor authentication
publisher MDPI AG
series Cryptography
issn 2410-387X
publishDate 2020-12-01
description Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide the required levels of flexibility and pro-activity of the access procedures, thus, the concept of threshold-based multi-factor authentication (MFA) was introduced, in which some of the factors may be missing, but the access can still be granted. In turn, secret sharing is a crucial component of the MFA systems, with Shamir’s schema being the most widely known one historically and based on Lagrange interpolation polynomial. Interestingly, the older Newtonian approach to the same problem is almost left without attention. At the same time, it means that the coefficients of the existing secret polynomial do not need to be re-calculated while adding a new factor. Therefore, this paper investigates this known property of Newton’s interpolation formula, illustrating that, in specific MFA cases, the whole system may become more flexible and scalable, which is essential for future authentication systems.
topic authentication
interpolation
Netwon’s polynomial
secret sharing
url https://www.mdpi.com/2410-387X/4/4/34
work_keys_str_mv AT sergeybezzateev onsecretsharingwithnewtonspolynomialformultifactorauthentication
AT vadimdavydov onsecretsharingwithnewtonspolynomialformultifactorauthentication
AT aleksandrometov onsecretsharingwithnewtonspolynomialformultifactorauthentication
_version_ 1724410676421591040