TY - GEN
T1 - A group authentication scheme based on lagrange interpolation polynomial
AU - Li, Shi
AU - Doh, Inshil
AU - Chae, Kijoon
N1 - Funding Information:
The work is supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2011788). And it is also partially supported by the State Scholarship Fund organized by the China Scholarship Council (CSC)
Publisher Copyright:
© 2016 IEEE.
PY - 2016/12/21
Y1 - 2016/12/21
N2 - Group authentication, as a new type of security services in group communication application, can authenticate all users belonging to the same group at the same time. Most existing group authentication schemes are presented with high computation and communication complexities. Thus, in this paper, we propose a group authentication mechanism based on the Lagrange interpolation polynomial theory, which can distribute a number of secret shares to the group members and authenticate some/all of them at once later. From the experience analysis result, we show that both the computation and communication complexities of our proposed scheme are much lower than those of existing renowned group authentication scheme. And the security analysis result shows that the proposed scheme can guarantee the CIA (Confidentiality, Integrity and Availability) triad security model.
AB - Group authentication, as a new type of security services in group communication application, can authenticate all users belonging to the same group at the same time. Most existing group authentication schemes are presented with high computation and communication complexities. Thus, in this paper, we propose a group authentication mechanism based on the Lagrange interpolation polynomial theory, which can distribute a number of secret shares to the group members and authenticate some/all of them at once later. From the experience analysis result, we show that both the computation and communication complexities of our proposed scheme are much lower than those of existing renowned group authentication scheme. And the security analysis result shows that the proposed scheme can guarantee the CIA (Confidentiality, Integrity and Availability) triad security model.
KW - Authentication
KW - Group communication
KW - Group-oriented applications
KW - Lagrange interpolation
KW - Secret sharing
UR - http://www.scopus.com/inward/record.url?scp=85011114810&partnerID=8YFLogxK
U2 - 10.1109/IMIS.2016.51
DO - 10.1109/IMIS.2016.51
M3 - Conference contribution
AN - SCOPUS:85011114810
T3 - Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
SP - 386
EP - 391
BT - Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
A2 - Xhafa, Fatos
A2 - Barolli, Leonard
A2 - Uchida, Noriki
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 6 July 2016 through 8 July 2016
ER -