skip to main content
10.1145/2902961.2903039acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article
Public Access

Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits

Published:18 May 2016Publication History

ABSTRACT

In this era of Internet of Things (IoT), connectivity exists everywhere, among everything (including people) at all times. Therefore, security, trust, and privacy become crucial to the design and implementation of IoT devices [12]. However, it is challenging to build security into IoT devices because most of them are constrained by extremely limited resources such as the battery, memory, and computation power etc. Inspired by the concept of visual cryptography [4] that requires the least amount of computation and a recent work on pure hardware-based single-user authentication [6], we present a novel solution to the secret sharing and multi-user authentication problem. Our solution is built on the observation that non-volatile resistive memories display nice monotonic and additive properties during resistive state transitions. We demonstrate how to design a hardware dependent multi-user authentication protocol using resistive random access memory (RRAM)-based hardware and provide the necessary circuits for the application. Finally, we simulate the proposed circuit to understand the nature of the operation and practical problems that these designs encounter during operation.

References

  1. Shamir, Adi. "How to share a secret." Communications of the ACM 22.11 (1979): 612--613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Blakley, George Robert. "Safeguarding cryptographic keys." AFIPS. IEEE, 1979.Google ScholarGoogle Scholar
  3. Stinson, Douglas R. "An explication of secret sharing schemes." Designs, Codes and Cryptography 2.4 (1992): 357--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Naor, Moni, et al. "Visual cryptography." Advances in Cryptology-EUROCRYPT'94. Springer Berlin/Heidelberg, 1995.Google ScholarGoogle Scholar
  5. Arafin, M. T., et al. "A survey on memristor modeling and security applications." Quality Electronic Design (ISQED), 2015 16th International Symposium on. IEEE, 2015.Google ScholarGoogle Scholar
  6. Arafin, Md Tanvir, and Gang Qu. "RRAM based lightweight user authentication." Computer-Aided Design (ICCAD), 2015 IEEE/ACM International Conference on. IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Verheul, Eric R., and Henk CA Van Tilborg. "Constructions and properties of k out of n visual secret sharing schemes." Designs, Codes and Cryptography 11.2 (1997): 179--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Predictive technology model (PTM), http://ptm.asu.edu/Google ScholarGoogle Scholar
  9. Guan, Ximeng, et al. "A SPICE compact model of metal oxide resistive switching memory with variations." IEEE electron device letters 33.10 (2012): 1405--1407.Google ScholarGoogle Scholar
  10. Wong, H-S. Philip, et al. "Metal-oxide RRAM." Proceedings of the IEEE 100.6 (2012): 1951--1970.Google ScholarGoogle ScholarCross RefCross Ref
  11. Naor, Moni, and Benny Pinkas. "Visual authentication and identification." Advances in Cryptology-CRYPTO'97. Springer Berlin Heidelberg, 1997. 322--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Qu, Gang, and Lin Yuan. "Design THINGS for the Internet of Things-An EDA perspective." Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. "Two-person integrity" available online at http://informationtechniciantraining.tpub.com/14222/css/14222_85.htm, pp. 3--9 & 3--10Google ScholarGoogle Scholar
  14. "How the NSA is preventing another Snowden (and why you should do the same) ", Computer World, Jan. 7, 2014. Available online at http://www.computerworld.com/article/2474270/cybercrime-hacking/how-the-nsa-is-preventing-another-snowden-and-why-you-should-do-the-same-.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Secret Sharing and Multi-user Authentication: From Visual Cryptography to RRAM Circuits

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSI
      May 2016
      462 pages
      ISBN:9781450342742
      DOI:10.1145/2902961

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 May 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      GLSVLSI '16 Paper Acceptance Rate50of197submissions,25%Overall Acceptance Rate312of1,156submissions,27%

      Upcoming Conference

      GLSVLSI '24
      Great Lakes Symposium on VLSI 2024
      June 12 - 14, 2024
      Clearwater , FL , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader