Provably Secure Group Authentication in the Asynchronous Communication Model

被引:0
|
作者
Xia, Zhe [1 ,2 ]
Harn, Lein [3 ]
Yang, Bo [4 ]
Zhang, Mingwu [5 ,6 ]
Mu, Yi [7 ]
Susilo, Willy [8 ]
Meng, Weizhi [9 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[4] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
[5] Hubei Univ Technol, Sch Comp, Wuhan, Peoples R China
[6] State Key Lab Cryptol, Beijing, Peoples R China
[7] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[8] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[9] Tech Univ Denmark, DTU Compute, Copenhagen, Denmark
基金
中国国家自然科学基金;
关键词
D O I
10.1007/978-3-030-41579-2_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is one of the most fundamental services in information security. Compared with traditional authentication methods, group authentication enables a group of users to be authenticated at once rather than authenticating each user individually. Therefore, it is preferred in the group-oriented environment, such as multicast/conference communications. While several group authentication schemes have been proposed over the past few years, no formal treatment for this cryptographic problem has ever been suggested. Existing papers only provide heuristic evidences of security and some of these schemes have later been found to be flawed. In this paper, we present a formal security model for this problem. Our model not only captures the basic requirement in group authentication that an adversary cannot pretend to be a group member without being detected, but also considers some desirable features in real-world applications, such as re-use of the credentials in multiple authentication sessions and allowance for users to exchange messages through asynchronous networks. We then introduce an efficient group authentication scheme where its security can be reduced to some well-studied complexity theoretic assumptions.
引用
收藏
页码:324 / 340
页数:17
相关论文
共 50 条
  • [1] A provably secure group authentication protocol for various LTE networks
    Kijjabuncha, Boriphat
    Hiranvanichakorn, Pipat
    International Journal of Network Security, 2019, 21 (06): : 957 - 970
  • [2] Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial
    Roychoudhury, Probidita
    Roychoudhury, Basav
    Saikia, Dilip Kumar
    COMPUTER COMMUNICATIONS, 2018, 127 : 146 - 157
  • [3] Provably secure anonymous authentication key agreement protocol for multicast group
    Feng T.
    Liu Y.-Y.
    Ma J.-F.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (02): : 273 - 277
  • [4] Provably secure model for group key exchange
    Cao, Chunjie
    Ma, Hanfeng
    Moon, Sanglae
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1380 - 1385
  • [5] Provably secure authentication for the internet of vehicles
    Nurkifli, E. Haodudin
    Hwang, Tzonelih
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)
  • [6] An efficient provably secure authentication and key agreement protocol for satellite communication networks
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    SECURITY AND PRIVACY, 2024, 7 (05)
  • [7] Asynchronous Provably-Secure Hidden Services
    Camacho, Philippe
    Krell, Fernando
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 179 - 197
  • [8] A Provably Secure Asynchronous Proactive RSA Scheme
    张瑞山
    李强
    陈克非
    Journal of Shanghai Jiaotong University, 2005, (04) : 333 - 337
  • [9] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [10] Provably Secure Scalable Distributed Authentication for Clouds
    Huszti, Andrea
    Olah, Norbert
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 188 - 210