Dynamic Group Time-Based One-Time Passwords

被引:1
|
作者
Cao, Xuelian [1 ]
Yang, Zheng [1 ]
Ning, Jianting [2 ,3 ]
Jin, Chenglu [4 ]
Lu, Rongxing [5 ]
Liu, Zhiming [1 ]
Zhou, Jianying [6 ]
机构
[1] Southwest Univ, Sch Software, Comp & Informat Sci, Chongqing 400715, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350117, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[4] Ctr Wiskunde & Informat, NL-1098 XG Amsterdam, Netherlands
[5] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[6] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
关键词
Group time-based one-time passwords; dynamic group management; anonymity; traceability; authentication; security model; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1109/TIFS.2024.3386350
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic primitive for achieving anonymous client authentication, which enables the efficient generation of time-based one-time passwords on behalf of a group without revealing any information about the actual client's identity beyond their group membership. The security properties of GTOTP regarding anonymity and traceability have been formulated in a static group management setting (where all group members should be determined during the group initialization phase), yet, a formal treatment for real-world dynamic groups (i.e., group members may join and leave at any time) is still an open question. It is non-trivial to construct an efficient GTOTP scheme that can provide a lightweight password generation procedure run by group members and support dynamic group management, allowing group members to join and leave without affecting other members' states (non-disruptively). To address the above challenge, we first define the notion and the security model of dynamic group time-based one-time passwords (DGTOTP) in this work. We then present an efficient DGTOTP construction that can generically transform an asymmetric time-based one-time passwords scheme into a DGTOTP scheme utilizing a chameleon hash function family and a Merkle tree scheme. Within our construction, we particularly tailor an outsourcing solution realizing an issue-first-and-join-later (IFJL) strategy, enabling smooth joining and revocation without disrupting other group members. Moreover, our scheme minimizes symmetric cryptographic operations and maintains constant storage for group members, compared to the linear storage cost that grows rapidly with respect to the lifetime of the GTOTP instance in the previous static GTOTP scheme. Our DGTOTP scheme satisfies stronger security guarantees in a dynamic group management setting without random oracles. Our experimental results confirm the efficiency of our DGTOTP scheme.
引用
收藏
页码:4897 / 4913
页数:17
相关论文
共 50 条
  • [21] One-time setup
    Schafer, Christiane
    MUSIK UND KIRCHE, 2024, 94 (01): : 19 - 19
  • [22] 'One-time use'
    Allen, RD
    HUDSON REVIEW, 2005, 58 (01): : 68 - 68
  • [23] The One-Time Monster
    Bazzett, Michael
    NORTH AMERICAN REVIEW, 2015, 300 (01): : 24 - 24
  • [24] 'ONE-TIME SERVANT'
    FERNANDO, B
    JOURNAL OF SOUTH ASIAN LITERATURE, 1976, 12 (1-2) : 19 - 19
  • [25] One-time programs
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Rothblum, Guy N.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 39 - +
  • [26] Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords
    Krentz, Konrad-Felix
    Voigt, Thiemo
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 : 389 - 405
  • [27] Improvement of Kerberos Protocol Based on Dynamic Password and "One-time Public Key"
    Du, Yun-yun
    Ning, Hong-yun
    Yang, Ping
    Cui, Yan-xia
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 1020 - 1025
  • [28] On The Generation of Alphanumeric One Time Passwords
    Srivastava, Shubham
    Sivasankar, M.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 1, 2016, : 532 - 534
  • [29] Design of a Time and Location Based One-Time Password Authentication Scheme
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 201 - 206
  • [30] Security of a one-time signature
    Yen, SM
    ELECTRONICS LETTERS, 1997, 33 (08) : 677 - 679