skip to main content
10.1145/2902961.2903039acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article
Public Access

Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits

Published: 18 May 2016 Publication History

Abstract

In this era of Internet of Things (IoT), connectivity exists everywhere, among everything (including people) at all times. Therefore, security, trust, and privacy become crucial to the design and implementation of IoT devices [12]. However, it is challenging to build security into IoT devices because most of them are constrained by extremely limited resources such as the battery, memory, and computation power etc. Inspired by the concept of visual cryptography [4] that requires the least amount of computation and a recent work on pure hardware-based single-user authentication [6], we present a novel solution to the secret sharing and multi-user authentication problem. Our solution is built on the observation that non-volatile resistive memories display nice monotonic and additive properties during resistive state transitions. We demonstrate how to design a hardware dependent multi-user authentication protocol using resistive random access memory (RRAM)-based hardware and provide the necessary circuits for the application. Finally, we simulate the proposed circuit to understand the nature of the operation and practical problems that these designs encounter during operation.

References

[1]
Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612--613.
[2]
Blakley, George Robert. "Safeguarding cryptographic keys." AFIPS. IEEE, 1979.
[3]
Stinson, Douglas R. "An explication of secret sharing schemes." Designs, Codes and Cryptography 2.4 (1992): 357--390.
[4]
Naor, Moni, et al. "Visual cryptography." Advances in Cryptology-EUROCRYPT'94. Springer Berlin/Heidelberg, 1995.
[5]
Arafin, M. T., et al. "A survey on memristor modeling and security applications." Quality Electronic Design (ISQED), 2015 16th International Symposium on. IEEE, 2015.
[6]
Arafin, Md Tanvir, and Gang Qu. "RRAM based lightweight user authentication." Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on. IEEE, 2015.
[7]
Verheul, Eric R., and Henk CA Van Tilborg. "Constructions and properties of k out of n visual secret sharing schemes." Designs, Codes and Cryptography 11.2 (1997): 179--196.
[8]
Predictive technology model (PTM), http://ptm.asu.edu/
[9]
Guan, Ximeng, et al. "A SPICE compact model of metal oxide resistive switching memory with variations." IEEE electron device letters 33.10 (2012): 1405--1407.
[10]
Wong, H-S. Philip, et al. "Metal-oxide RRAM." Proceedings of the IEEE 100.6 (2012): 1951--1970.
[11]
Naor, Moni, and Benny Pinkas. "Visual authentication and identification." Advances in Cryptology-CRYPTO'97. Springer Berlin Heidelberg, 1997. 322--336.
[12]
Qu, Gang, and Lin Yuan. "Design THINGS for the Internet of Things-An EDA perspective." Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on. IEEE, 2014.
[13]
"Two-person integrity" available online at http://informationtechniciantraining.tpub.com/14222/css/14222_85.htm, pp. 3--9 & 3--10
[14]
"How the NSA is preventing another Snowden (and why you should do the same) ", Computer World, Jan. 7, 2014. Available online at http://www.computerworld.com/article/2474270/cybercrime-hacking/how-the-nsa-is-preventing-another-snowden-and-why-you-should-do-the-same-.html

Cited By

View all
  • (2018)Memristors for Secret Sharing-Based Lightweight AuthenticationIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2018.282371426:12(2671-2683)Online publication date: Dec-2018
  • (2017)Distortion less secret image sharing scheme for Internet of Things systemCluster Computing10.1007/s10586-017-1345-yOnline publication date: 30-Nov-2017

Index Terms

  1. Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSI
    May 2016
    462 pages
    ISBN:9781450342742
    DOI:10.1145/2902961
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 May 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. multi-user authentication
    2. resistive memory
    3. secret sharing
    4. visual cryptography

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    GLSVLSI '16
    Sponsor:
    GLSVLSI '16: Great Lakes Symposium on VLSI 2016
    May 18 - 20, 2016
    Massachusetts, Boston, USA

    Acceptance Rates

    GLSVLSI '16 Paper Acceptance Rate 50 of 197 submissions, 25%;
    Overall Acceptance Rate 271 of 1,008 submissions, 27%

    Upcoming Conference

    GLSVLSI '25
    Great Lakes Symposium on VLSI 2025
    June 30 - July 2, 2025
    New Orleans , LA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)58
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Memristors for Secret Sharing-Based Lightweight AuthenticationIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2018.282371426:12(2671-2683)Online publication date: Dec-2018
    • (2017)Distortion less secret image sharing scheme for Internet of Things systemCluster Computing10.1007/s10586-017-1345-yOnline publication date: 30-Nov-2017

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media