Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
Authentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it i...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/6183861 |
id |
doaj-e066d8551c694350a5b6b9406d7493f5 |
---|---|
record_format |
Article |
spelling |
doaj-e066d8551c694350a5b6b9406d7493f52020-11-25T03:29:20ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/61838616183861Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple AuthenticationsZhe Xia0Yining Liu1Ching-Fang Hsu2Chin-Chen Chang3School of Computer Science, Wuhan University of Technology, Wuhan 430071, ChinaSchool of Computer and Information Security, Guilin University of Electronic Technology, Guilin 541004, ChinaComputer School, Central China Normal University, Wuhan 430079, ChinaDepartment of Information Engineering and Computer Science, Feng Chia University, Taichung, TaiwanAuthentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it is more desirable in the group oriented environment, such as multicast/conference communications. In this paper, we first demonstrate that a recent group authentication scheme by Chien (Security and Communication Networks, 2017) suffers some security flaws, i.e. an adversary in the asynchronous communication model can pretend to be a legitimate group member without being detected. We then use the Anonymous Veto Networks (AV-net) to patch Chien’s scheme, so that its security can be rigorously proved in a well-defined security model.http://dx.doi.org/10.1155/2020/6183861 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Zhe Xia Yining Liu Ching-Fang Hsu Chin-Chen Chang |
spellingShingle |
Zhe Xia Yining Liu Ching-Fang Hsu Chin-Chen Chang Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications Security and Communication Networks |
author_facet |
Zhe Xia Yining Liu Ching-Fang Hsu Chin-Chen Chang |
author_sort |
Zhe Xia |
title |
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications |
title_short |
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications |
title_full |
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications |
title_fullStr |
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications |
title_full_unstemmed |
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications |
title_sort |
cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
Authentication is one of the most fundamental services in cryptography and information security. Compared with the traditional authentication methods, group authentication allows a group of users to be authenticated at once rather than authenticating each of these users individually. Therefore, it is more desirable in the group oriented environment, such as multicast/conference communications. In this paper, we first demonstrate that a recent group authentication scheme by Chien (Security and Communication Networks, 2017) suffers some security flaws, i.e. an adversary in the asynchronous communication model can pretend to be a legitimate group member without being detected. We then use the Anonymous Veto Networks (AV-net) to patch Chien’s scheme, so that its security can be rigorously proved in a well-defined security model. |
url |
http://dx.doi.org/10.1155/2020/6183861 |
work_keys_str_mv |
AT zhexia cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications AT yiningliu cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications AT chingfanghsu cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications AT chinchenchang cryptanalysisandimprovementofagroupauthenticationschemewithmultipletrialsandmultipleauthentications |
_version_ |
1715200536361304064 |