Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications

Authentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it i...

Full description

Bibliographic Details
Main Authors: Zhe Xia, Yining Liu, Ching-Fang Hsu, Chin-Chen Chang
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/6183861
id doaj-e066d8551c694350a5b6b9406d7493f5
record_format Article
spelling doaj-e066d8551c694350a5b6b9406d7493f52020-11-25T03:29:20ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/61838616183861Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple AuthenticationsZhe Xia0Yining Liu1Ching-Fang Hsu2Chin-Chen Chang3School of Computer Science, Wuhan University of Technology, Wuhan 430071, ChinaSchool of Computer and Information Security, Guilin University of Electronic Technology, Guilin 541004, ChinaComputer School, Central China Normal University, Wuhan 430079, ChinaDepartment of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanAuthentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it is more desirable in the group oriented environment, such as multicast/conference communications. In this paper, we first demonstrate that a recent group authentication scheme by Chien (Security and Communication Networks, 2017) suffers some security flaws, i.e. an adversary in the asynchronous communication model can pretend to be a legitimate group member without being detected. We then use the Anonymous Veto Networks (AV-net) to patch Chien’s scheme, so that its security can be rigorously proved in a well-defined security model.http://dx.doi.org/10.1155/2020/6183861
collection DOAJ
language English
format Article
sources DOAJ
author Zhe Xia
Yining Liu
Ching-Fang Hsu
Chin-Chen Chang
spellingShingle Zhe Xia
Yining Liu
Ching-Fang Hsu
Chin-Chen Chang
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
Security and Communication Networks
author_facet Zhe Xia
Yining Liu
Ching-Fang Hsu
Chin-Chen Chang
author_sort Zhe Xia
title Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
title_short Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
title_full Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
title_fullStr Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
title_full_unstemmed Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
title_sort cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Authentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it is more desirable in the group oriented environment, such as multicast/conference communications. In this paper, we first demonstrate that a recent group authentication scheme by Chien (Security and Communication Networks, 2017) suffers some security flaws, i.e. an adversary in the asynchronous communication model can pretend to be a legitimate group member without being detected. We then use the Anonymous Veto Networks (AV-net) to patch Chien’s scheme, so that its security can be rigorously proved in a well-defined security model.
url http://dx.doi.org/10.1155/2020/6183861
work_keys_str_mv AT zhexia cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications
AT yiningliu cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications
AT chingfanghsu cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications
AT chinchenchang cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications
_version_ 1715200536361304064