A Group Authentication Scheme Supporting Cheating Detection and Identification
Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authenticati...
Saved in:
Published in | International Conference on Frontier of Computer Science and Technology (Print) pp. 110 - 114 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2015
|
Subjects | |
Online Access | Get full text |
ISSN | 2159-6301 |
DOI | 10.1109/FCST.2015.52 |
Cover
Abstract | Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authentication is designed for group-oriented applications. A lot of user authentication schemes only support one-to-one principle of authentication. However, network applications are no longer one-to-one communication, multiple users may be involved. So the scheme proposed a many-to-many communication. The scheme is based on Shamir's (t, n) threshold secret sharing scheme. The threshold scheme can protect a secret with high security and reliability when all the participants are honest. If some dishonest participants exist, the other honest participants may obtain a false secret which will lead to a false authentication, making them think all the participants are in the same group. It can reveal the content of the communication between them. We improve the t-secure m-user n-group authentication scheme, where t is the threshold of the scheme, m is the number of participants in the group authentication, and n is the number of members of the group. We choose a one-way function and then compute a parameter value which we will mention below. Which involve in a method to detect and identify the nonmembers in the group. |
---|---|
AbstractList | Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also necessary. So an optimized group authentication which can detect and identify the nonmembers is proposed in this paper. The group authentication is designed for group-oriented applications. A lot of user authentication schemes only support one-to-one principle of authentication. However, network applications are no longer one-to-one communication, multiple users may be involved. So the scheme proposed a many-to-many communication. The scheme is based on Shamir's (t, n) threshold secret sharing scheme. The threshold scheme can protect a secret with high security and reliability when all the participants are honest. If some dishonest participants exist, the other honest participants may obtain a false secret which will lead to a false authentication, making them think all the participants are in the same group. It can reveal the content of the communication between them. We improve the t-secure m-user n-group authentication scheme, where t is the threshold of the scheme, m is the number of participants in the group authentication, and n is the number of members of the group. We choose a one-way function and then compute a parameter value which we will mention below. Which involve in a method to detect and identify the nonmembers in the group. |
Author | Lifeng Yuan Cheng Guo Bin Feng Ruhan Zhuang |
Author_xml | – sequence: 1 surname: Cheng Guo fullname: Cheng Guo email: guocheng@dlut.edu.cn organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China – sequence: 2 surname: Ruhan Zhuang fullname: Ruhan Zhuang email: clindy007@163.com organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China – sequence: 3 surname: Lifeng Yuan fullname: Lifeng Yuan email: lifengyuan1230@gmail.com organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China – sequence: 4 surname: Bin Feng fullname: Bin Feng email: fengbin@dlut.edu.cn organization: Sch. of Software of Technol., Dalian Univ. of Technol., Dalian, China |
BookMark | eNotjztPwzAcxI1UJErJxsbiL5Dgt-MxCrRUqmBImavE_ptYok6Ux8C3p6_pbrjf6e4RLWIXAaFnSjJKiXldl9U-Y4TKTLI7lBidU6E0N8xItkBLRqVJFSf0ASXjGBrClFaSCL1EnwXeDN3c42KeWohTsPUUuogr28IRcDX3fTdMIf7gsoX6Yt5gAnsJ1dHhrTtT_sY9oXtf_46Q3HSFvtfv-_Ij3X1ttmWxSwPTYkqtEMQRY84bHXijrPFSc5-DV0Z5LRx1nkGujXCKWd6IuuHSWXJ6Ja2zfIVerr0BAA79EI718HfQ_HRbGv4PfxZQtA |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/FCST.2015.52 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467392952 1467392952 1467392944 9781467392945 |
EndPage | 114 |
ExternalDocumentID | 7314659 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i274t-c440d0996739def96c9f573f8ef696f74d1df2e8794d62c3b4ab35dc04675cdc3 |
IEDL.DBID | RIE |
ISSN | 2159-6301 |
IngestDate | Wed Aug 27 02:51:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i274t-c440d0996739def96c9f573f8ef696f74d1df2e8794d62c3b4ab35dc04675cdc3 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7314659 |
PublicationCentury | 2000 |
PublicationDate | 20150801 |
PublicationDateYYYYMMDD | 2015-08-01 |
PublicationDate_xml | – month: 08 year: 2015 text: 20150801 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | International Conference on Frontier of Computer Science and Technology (Print) |
PublicationTitleAbbrev | FCST |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib026765047 ssj0003177943 |
Score | 1.604044 |
Snippet | Group authentication is a valid scheme to make sure whether all participants belong to the same group. For nonmembers, detecting and identifying them is also... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 110 |
SubjectTerms | Authentication cheater identification cheating detection Computers Cryptography group-oriented application Polynomials Reliability secret sharing Software |
Title | A Group Authentication Scheme Supporting Cheating Detection and Identification |
URI | https://ieeexplore.ieee.org/document/7314659 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT55UWvFNDh7N1t1kk-Yo1VKEFqEt9FbyFBG3ItuLv76ZZFtFPHgLgUCYmWQmk--bQejGc6WNMDkpnNCEheNGNBWKGMuYHlBW2th5bjLl4wV7WpbLFrrdc2GccxF85jIYxr98uzYbSJX1BQ3nupRt1A5mlrhaO9spuAixRhMawy0c_KJIoLng1CThwZD3uHfZHw1nc8B1lRkwjn70VYluZXSIJrsNJTTJW7apdWa-ftVq_O-Oj1Dvm8CHn_eu6Ri1XNVF03scM00Y0mIAEkrZOjwLent3GPp7rqGmwAsewg0NgwdXR6hWhVVlcSL1-mZdDy1Gj_PhmDTtFMhreHrWxDB2Z0NAyAWV1nnJjfSloH7gPJfcC2Zz6ws3CGKzvDBUM6VpaU14QYvSWENPUKdaV-4UiN6MKkpzJ5RnuVZaQ1l9IYX0FJirZ6gLslh9pIoZq0YM539PX6ADUEWC1V2iTv25cVfB1df6Oup4C4Inpt8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA61HvSk0opvc_BoVnfzao5SLVXbIrSF3srmJSJuRbYXf72ZzbaKePAWAgthJsk3mf2-GYQuvMi1kSYlmZOasHDciKYyJ8YypjuUcVt1nhuORH_KHmZ81kCXay2Mc64in7kEhtW_fLswS0iVXUkazjVXG2gz4D7jUa212j2ZkCHaqINjuIcDMspImwuwpogIW3nNfFdXve54AswunoDm6EdnlQpYejtouFpS5JO8JstSJ-bzV7XG_655F7W_JXz4aQ1Oe6jhihYa3eAq14QhMQY0oZivw-PguTeHocPnAqoKPOMu3NEwuHVlRdYqcF5YHGW9vv6ujaa9u0m3T-qGCuQlPD5LYhi7tiEkFJIq67wSRnkuqe84L5TwktnU-sx1gtmsyAzVLNeUWxPe0JIba-g-ahaLwh2A1JvRnNLUydyzVOdaQ2F9qaTyFLSrh6gFtpi_x5oZ89oMR39Pn6Ot_mQ4mA_uR4_HaBvcEkl2J6hZfizdaQD-Up9V_v4Cci-qLA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Frontier+of+Computer+Science+and+Technology+%28Print%29&rft.atitle=A+Group+Authentication+Scheme+Supporting+Cheating+Detection+and+Identification&rft.au=Cheng+Guo&rft.au=Ruhan+Zhuang&rft.au=Lifeng+Yuan&rft.au=Bin+Feng&rft.date=2015-08-01&rft.pub=IEEE&rft.issn=2159-6301&rft.spage=110&rft.epage=114&rft_id=info:doi/10.1109%2FFCST.2015.52&rft.externalDocID=7314659 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-6301&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-6301&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-6301&client=summon |