A Group Authentication Scheme Supporting Cheating Detection and Identification

Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authenticati...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Frontier of Computer Science and Technology (Print) pp. 110 - 114
Main Authors Cheng Guo, Ruhan Zhuang, Lifeng Yuan, Bin Feng
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2015
Subjects
Online AccessGet full text
ISSN2159-6301
DOI10.1109/FCST.2015.52

Cover

Abstract Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authentication is designed for group-oriented applications. A lot of user authentication schemes only support one-to-one principle of authentication. However, network applications are no longer one-to-one communication, multiple users may be involved. So the scheme proposed a many-to-many communication. The scheme is based on Shamir's (t, n) threshold secret sharing scheme. The threshold scheme can protect a secret with high security and reliability when all the participants are honest. If some dishonest participants exist, the other honest participants may obtain a false secret which will lead to a false authentication, making them think all the participants are in the same group. It can reveal the content of the communication between them. We improve the t-secure m-user n-group authentication scheme, where t is the threshold of the scheme, m is the number of participants in the group authentication, and n is the number of members of the group. We choose a one-way function and then compute a parameter value which we will mention below. Which involve in a method to detect and identify the nonmembers in the group.
AbstractList Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authentication is designed for group-oriented applications. A lot of user authentication schemes only support one-to-one principle of authentication. However, network applications are no longer one-to-one communication, multiple users may be involved. So the scheme proposed a many-to-many communication. The scheme is based on Shamir's (t, n) threshold secret sharing scheme. The threshold scheme can protect a secret with high security and reliability when all the participants are honest. If some dishonest participants exist, the other honest participants may obtain a false secret which will lead to a false authentication, making them think all the participants are in the same group. It can reveal the content of the communication between them. We improve the t-secure m-user n-group authentication scheme, where t is the threshold of the scheme, m is the number of participants in the group authentication, and n is the number of members of the group. We choose a one-way function and then compute a parameter value which we will mention below. Which involve in a method to detect and identify the nonmembers in the group.
Author Lifeng Yuan
Cheng Guo
Bin Feng
Ruhan Zhuang
Author_xml – sequence: 1
  surname: Cheng Guo
  fullname: Cheng Guo
  email: guocheng@dlut.edu.cn
  organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China
– sequence: 2
  surname: Ruhan Zhuang
  fullname: Ruhan Zhuang
  email: clindy007@163.com
  organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China
– sequence: 3
  surname: Lifeng Yuan
  fullname: Lifeng Yuan
  email: lifengyuan1230@gmail.com
  organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China
– sequence: 4
  surname: Bin Feng
  fullname: Bin Feng
  email: fengbin@dlut.edu.cn
  organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China
BookMark eNotjztPwzAcxI1UJErJxsbiL5Dgt-MxCrRUqmBImavE_ptYok6Ux8C3p6_pbrjf6e4RLWIXAaFnSjJKiXldl9U-Y4TKTLI7lBidU6E0N8xItkBLRqVJFSf0ASXjGBrClFaSCL1EnwXeDN3c42KeWohTsPUUuogr28IRcDX3fTdMIf7gsoX6Yt5gAnsJ1dHhrTtT_sY9oXtf_46Q3HSFvtfv-_Ij3X1ttmWxSwPTYkqtEMQRY84bHXijrPFSc5-DV0Z5LRx1nkGujXCKWd6IuuHSWXJ6Ja2zfIVerr0BAA79EI718HfQ_HRbGv4PfxZQtA
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/FCST.2015.52
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467392952
1467392952
1467392944
9781467392945
EndPage 114
ExternalDocumentID 7314659
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i274t-c440d0996739def96c9f573f8ef696f74d1df2e8794d62c3b4ab35dc04675cdc3
IEDL.DBID RIE
ISSN 2159-6301
IngestDate Wed Aug 27 02:51:32 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i274t-c440d0996739def96c9f573f8ef696f74d1df2e8794d62c3b4ab35dc04675cdc3
PageCount 5
ParticipantIDs ieee_primary_7314659
PublicationCentury 2000
PublicationDate 20150801
PublicationDateYYYYMMDD 2015-08-01
PublicationDate_xml – month: 08
  year: 2015
  text: 20150801
  day: 01
PublicationDecade 2010
PublicationTitle International Conference on Frontier of Computer Science and Technology (Print)
PublicationTitleAbbrev FCST
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib026765047
ssj0003177943
Score 1.604044
Snippet Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also...
SourceID ieee
SourceType Publisher
StartPage 110
SubjectTerms Authentication
cheater identification
cheating detection
Computers
Cryptography
group-oriented application
Polynomials
Reliability
secret sharing
Software
Title A Group Authentication Scheme Supporting Cheating Detection and Identification
URI https://ieeexplore.ieee.org/document/7314659
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT55UWvFNDh7N1t1kk-Yo1VKEFqEt9FbyFBG3ItuLv76ZZFtFPHgLgUCYmWQmk--bQejGc6WNMDkpnNCEheNGNBWKGMuYHlBW2th5bjLl4wV7WpbLFrrdc2GccxF85jIYxr98uzYbSJX1BQ3nupRt1A5mlrhaO9spuAixRhMawy0c_KJIoLng1CThwZD3uHfZHw1nc8B1lRkwjn70VYluZXSIJrsNJTTJW7apdWa-ftVq_O-Oj1Dvm8CHn_eu6Ri1XNVF03scM00Y0mIAEkrZOjwLent3GPp7rqGmwAsewg0NgwdXR6hWhVVlcSL1-mZdDy1Gj_PhmDTtFMhreHrWxDB2Z0NAyAWV1nnJjfSloH7gPJfcC2Zz6ws3CGKzvDBUM6VpaU14QYvSWENPUKdaV-4UiN6MKkpzJ5RnuVZaQ1l9IYX0FJirZ6gLslh9pIoZq0YM539PX6ADUEWC1V2iTv25cVfB1df6Oup4C4Inpt8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61HvSk0opvc_BoVnfzao5SLVXbIrSF3srmJSJuRbYXf72ZzbaKePAWAgthJsk3mf2-GYQuvMi1kSYlmZOasHDciKYyJ8YypjuUcVt1nhuORH_KHmZ81kCXay2Mc64in7kEhtW_fLswS0iVXUkazjVXG2gz4D7jUa212j2ZkCHaqINjuIcDMspImwuwpogIW3nNfFdXve54AswunoDm6EdnlQpYejtouFpS5JO8JstSJ-bzV7XG_655F7W_JXz4aQ1Oe6jhihYa3eAq14QhMQY0oZivw-PguTeHocPnAqoKPOMu3NEwuHVlRdYqcF5YHGW9vv6ujaa9u0m3T-qGCuQlPD5LYhi7tiEkFJIq67wSRnkuqe84L5TwktnU-sx1gtmsyAzVLNeUWxPe0JIba-g-ahaLwh2A1JvRnNLUydyzVOdaQ2F9qaTyFLSrh6gFtpi_x5oZ89oMR39Pn6Ot_mQ4mA_uR4_HaBvcEkl2J6hZfizdaQD-Up9V_v4Cci-qLA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Frontier+of+Computer+Science+and+Technology+%28Print%29&rft.atitle=A+Group+Authentication+Scheme+Supporting+Cheating+Detection+and+Identification&rft.au=Cheng+Guo&rft.au=Ruhan+Zhuang&rft.au=Lifeng+Yuan&rft.au=Bin+Feng&rft.date=2015-08-01&rft.pub=IEEE&rft.issn=2159-6301&rft.spage=110&rft.epage=114&rft_id=info:doi/10.1109%2FFCST.2015.52&rft.externalDocID=7314659
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-6301&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-6301&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-6301&client=summon