A Group Key Establishment Scheme

09/30/2021
by   Sueda Guzey, et al.
0

Group authentication is a method of confirmation that a set of users belong to a group and of distributing a common key among them. Unlike the standard authentication schemes where one central authority authenticates users one by one, group authentication can handle the authentication process at once for all members of the group. The recently presented group authentication algorithms mainly exploit Lagrange's polynomial interpolation along with elliptic curve groups over finite fields. As a fresh approach, this work suggests use of linear spaces for group authentication and key establishment for a group of any size. The approach with linear spaces introduces a reduced computation and communication load to establish a common shared key among the group members. The advantages of using vector spaces make the proposed method applicable to energy and resource constrained devices. In addition to providing lightweight authentication and key agreement, this proposal allows any user in a group to make a non-member to be a member, which is expected to be useful for autonomous systems in the future. The scheme is designed in a way that the sponsors of such members can easily be recognized by anyone in the group. Unlike the other group authentication schemes based on Lagrange's polynomial interpolation, the proposed scheme doesn't provide a tool for adversaries to compromise the whole group secrets by using only a few members' shares as well as it allows to recognize a non-member easily, which prevents service interruption attacks.

READ FULL TEXT

page 1

page 10

research
08/27/2019

Authenticated Hand-Over Algorithm for Group Communication

Shamir or Blakley secret sharing schemes are used for the authentication...
research
04/28/2023

Hybrid Key Authentication Scheme for Privacy over Adhoc Communication

Since communication signals are publicly exposed while they transmit acr...
research
08/27/2019

Authentication and Hand-Over Algorithms for IoT Group

Current advancements in mobility of devices and also Internet of Things ...
research
08/06/2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication

Group oriented applications are getting more and more popular in today's...
research
04/12/2020

The Albakri-Harn key pre-distribution scheme is insecure

The Albakri-Harn group key pre-distribution protocol, which enables any ...
research
03/27/2023

Collaborative Authentication for 6G Networks: An Edge Intelligence based Autonomous Approach

The conventional device authentication of wireless networks usually reli...
research
04/21/2020

Group Key Agreement in Information Centric Networks with Tree Group Diffie-Hellman

The client-server model is known to scale badly without redundant server...

Please sign up or login with your details

Forgot password? Click here to reset