Provably Secure Group Authentication in the Asynchronous Communication Model

被引:0
|
作者
Xia, Zhe [1 ,2 ]
Harn, Lein [3 ]
Yang, Bo [4 ]
Zhang, Mingwu [5 ,6 ]
Mu, Yi [7 ]
Susilo, Willy [8 ]
Meng, Weizhi [9 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci, Wuhan, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[3] Univ Missouri, Dept Comp Sci & Elect Engn, Kansas City, MO 64110 USA
[4] Shaanxi Normal Univ, Sch Comp Sci, Xian, Peoples R China
[5] Hubei Univ Technol, Sch Comp, Wuhan, Peoples R China
[6] State Key Lab Cryptol, Beijing, Peoples R China
[7] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[8] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[9] Tech Univ Denmark, DTU Compute, Copenhagen, Denmark
基金
中国国家自然科学基金;
关键词
D O I
10.1007/978-3-030-41579-2_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is one of the most fundamental services in information security. Compared with traditional authentication methods, group authentication enables a group of users to be authenticated at once rather than authenticating each user individually. Therefore, it is preferred in the group-oriented environment, such as multicast/conference communications. While several group authentication schemes have been proposed over the past few years, no formal treatment for this cryptographic problem has ever been suggested. Existing papers only provide heuristic evidences of security and some of these schemes have later been found to be flawed. In this paper, we present a formal security model for this problem. Our model not only captures the basic requirement in group authentication that an adversary cannot pretend to be a group member without being detected, but also considers some desirable features in real-world applications, such as re-use of the credentials in multiple authentication sessions and allowance for users to exchange messages through asynchronous networks. We then introduce an efficient group authentication scheme where its security can be reduced to some well-studied complexity theoretic assumptions.
引用
收藏
页码:324 / 340
页数:17
相关论文
共 50 条
  • [31] Provably secure and efficient authentication techniques for the global mobility network
    Lee, Tian-Fu
    Hwang, Tzonelih
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1717 - 1725
  • [32] Provably Secure Access Authentication Protocol under Universal Network
    Zheng, Lijuan
    Han, Zhen
    Zhang, Rui
    Fan, Tongrang
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 371 - +
  • [33] An improved and provably secure privacy preserving authentication protocol for SIP
    Shehzad Ashraf Chaudhry
    Husnain Naqvi
    Muhammad Sher
    Mohammad Sabzinejad Farash
    Mahmood Ul Hassan
    Peer-to-Peer Networking and Applications, 2017, 10 : 1 - 15
  • [34] Authentication and Secure Robot Communication
    Yfantis, Evangelos A.
    Fayed, Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2014, 11
  • [35] A Model for Provably Secure Software Design
    van den Berghe, Alexander
    Yskout, Koen
    Joosen, Wouter
    Scandariato, Riccardo
    2017 IEEE/ACM 5TH INTERNATIONAL FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE) PROCEEDINGS, 2017, : 3 - 9
  • [36] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296
  • [37] Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
    Prakash, A. John
    Uthariaraj, V. Rhymend
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 246 - 253
  • [38] A distributed model for secure and scalable group communication
    Kim, Heeyoul
    Hong, Seong-min
    Yoon, H.
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 3, PROCEEDINGS, 2005, : 7 - 12
  • [39] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
    Nyangaresi, Vincent Omollo
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (04):
  • [40] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,