Filters








180,499 Hits in 3.0 sec

Group-Based Private Authentication

Gildas Avoine, Levente Buttyant, Tamas Holczer, Istvan Vajda
2007 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
We analyze the proposed scheme and show that it is superior to the wellknown key-tree based approach for private authentication both in terms of privacy and efficiency. search through a set of candidate  ...  We propose a novel authentication scheme that ensures privacy of the provers.  ...  Operation of the group-based private authentication scheme.  ... 
doi:10.1109/wowmom.2007.4351808 dblp:conf/wowmom/AvoineBHV07 fatcat:doajn3befvaevpff5safehitny

Authentication and Hand-Over Algorithms for IoT Group [article]

Yucel Aydin, Gunes Karabulut Kurt, Enver Ozdemır
2019 arXiv   pre-print
In this study, a new method is proposed to provide a secure group authentication and hand-over process between groups based on Lagrange's Interpolation.  ...  Shamir Secret Sharing algorithm is used for the authentication process in the studies before, but still secure group authentication algorithm and hand-over process are challenges in the group authentication  ...  Chien proposed a new method based on Shamir Secret Sharing, ECC and pairing-based cryptography in order to ensure a secure group authentication process.  ... 
arXiv:1908.10321v1 fatcat:kmjybevuzrbvfnibpcdvjp475e

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

Tianhan Gao, Fangting Peng, Nan Guo
2016 EURASIP Journal on Wireless Communications and Networking  
This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN.  ...  We suggest the proxy group signature scheme based on identity in this paper.  ...  Identity-based proxy group signature Identity-based Proxy Group Signature (IPGS) scheme is the combination of proxy group signature [9] and identitybased group signature [10] .  ... 
doi:10.1186/s13638-016-0685-2 fatcat:fly7yzgypbgjlnxcdkujglh6ai

A Group Key Establishment Scheme [article]

Sueda Guzey, Gunes Karabulut Kurt, Enver Ozdemir
2021 arXiv   pre-print
Unlike the other group authentication schemes based on Lagrange's polynomial interpolation, the proposed scheme doesn't provide a tool for adversaries to compromise the whole group secrets by using only  ...  Unlike the standard authentication schemes where one central authority authenticates users one by one, group authentication can handle the authentication process at once for all members of the group.  ...  Unlike the other group authentication algorithms that are based on polynomial interpolation, compromising few members' private key does not allow an adversary to impersonate as a group manager.  ... 
arXiv:2109.15037v1 fatcat:teex23klp5cqppedffuu7aw7y4

An efficient RFID anonymous batch authentication protocol based on group signature

Jie Xu, Lanjun Dang
2019 Discrete and Continuous Dynamical Systems. Series S  
was proposed based on group signature.  ...  The anonymous batch authentications of reader to many tags are achieved by using a one-time group signature based on Hash function; the authentication of the tag to the reader is realized by employing  ...  Proposed RFID anonymous batch authentication protocol based on group signature. Design goals.  ... 
doi:10.3934/dcdss.2019102 fatcat:3py6nkh3lzhnlhlfdaigmx37xu

A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication

Sharavanan Thanasekkaran, Balasubramanian V
2011 International Journal of Computer Applications  
The shares are calculated and distributed based on the ID of the group members by using efficient Shamir's secret sharing scheme.  ...  The private key of the group is updated if there is any violation in the threshold limit t due to variation of the number of group members in the group.  ...  The group private key is updated when the threshold property violates. Each unique key shares and public key of the group members are distributed based on their ID.  ... 
doi:10.5120/2450-2548 fatcat:xcm7eqt3t5edjhnamoj4aq7lsm

Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network

Zu-ping ZHANG, Yang SONG
2019 DEStech Transactions on Computer Science and Engineering  
Mobile ad hoc network is an autonomous network of several mobile nodes that don't rely on any base station facilities and management organizations.  ...  In this paper, with secret sharing a verifiable authentication scheme without trusted center is proposed, which can confirm the legitimacy of the every node in the mobile ad hoc network.  ...  Authentication Scheme of MANET Currently, there are two main methods for network node authentication: the authentication mechanism based on the public key certificate and the authentication mechanism based  ... 
doi:10.12783/dtcse/msota2018/27581 fatcat:o3taa573bzh3fg4qaylhijpr4y

A Flexible and Lightweight Group Authentication Scheme [article]

Yucel Aydin, Gunes Karabulut Kurt, Enver Özdemir, Halim Yanikomeroglu
2020 arXiv   pre-print
Group authentication schemes (GAS), on the other hand, have emerged as novel approaches for many-to-many authentication problems.  ...  Moreover, this approach can be used in both centralized and decentralized group authentication scenarios.  ...  Group members share their private keys publicly in other group authentication schemes (GAS).  ... 
arXiv:1909.06371v5 fatcat:72q4fsvm4nf5ziffaidzpyx5ri

Security Analysis of an ID-Based Key Agreement for Peer Group Communication

D.-L. VO, K. KIM
2007 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
In 2005, Wu et al. [3] proposed an identity-based key agreement for peer group communication from pairings.  ...  Pairing based cryptography has been researched intensively due to its beneficial properties.  ...  [3] proposed an identity-based key agreement protocol for peer group communication including user authentication.  ... 
doi:10.1093/ietfec/e90-a.11.2624 fatcat:jnfesdoubvb2hm5bbjwh57nj3e

Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks

Aymen Boudguiga, Maryline Laurent
2011 2011 IEEE Wireless Communications and Networking Conference  
In this article, we present an ID-based authentication scheme that is adapted to the IEEE 802.11s mesh networks and resistant against key escrow attacks.  ...  However, the drawback is the need for a Private Key Generator (PKG) entity which can perform a key escrow attack.  ...  Fig. 2 . 2 ID-based authentication scheme.  ... 
doi:10.1109/wcnc.2011.5779232 dblp:conf/wcnc/BoudguigaL11 fatcat:4xxrdb3kvfhuflm6clyqjnhen4

Analiza dviju studija o percipiranoj autentičnosti privatnih maraka

Sandra Horvat, Tanja Komarac, Đurđana Ozretić Došen
2021 Tržište  
private labels. secondly, to determine and verify the dimensions that would be appropriate for and specific to measuring private label authenticity.  ...  Purpose -The purpose of this paper is to explore further the dimensions of perceived private label authenticity. The aims are threefold.  ...  This makes it more authentic than in the beginning." Based on the theoretical insights, a semi-struc-tured focus group guide was prepared.  ... 
doi:10.22598/mt/2021.33.spec-issue.47 fatcat:c7yzvz5znjfs5hyzycokslw3wa

Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks [chapter]

Shrikant Sundaram, Peter Bertok, Benjamin Burton
2005 IFIP Advances in Information and Communication Technology  
With the increase of group-oriented applications, secure communication has to be provided between a group of nodes that may join and leave the network in an unplanned manner.  ...  This paper proposes a fast, scalable group encryption key model that is suitable for ad-hoc networks and is resistant against multiple compromised nodes. key-insulated, ad hoc networks, key generation,  ...  The private key is generated by a group of nodes in the group using the principles of threshold cryptography. The private key is based on the identity information of the node and time information.  ... 
doi:10.1007/0-387-25660-1_31 fatcat:kct4fdytwvh6pcpzjzyierrriq

Efficient group Diffie–Hellman key agreement protocols

Lein Harn, Changlu Lin
2014 Computers & electrical engineering  
In addition, we use a one-way key confirmation and digital certificates of DH public keys to provide authentication of group keys.  ...  In this paper, we propose GDH key agreement protocols based on the secret sharing scheme.  ...  [21] proposed a pairing-based group KE using a tree. Du et al. [23] proposed an authenticated ID-based group key exchange scheme which attains a constant number of rounds.  ... 
doi:10.1016/j.compeleceng.2013.12.018 fatcat:vl3r5izgo5abbesyx5rtwk25qu

An Improved One Round Authenticated Group Key Agreement
개선된 원 라운드 인증 그룹 키 합의 프로토콜

Ho-Hee Kim, Soon-Ja Kim
2013 Journal of the Korea Institute of Information Security and Cryptology  
In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system.  ...  Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols.  ...  As a result of the increased popularity of group oriented applications, the design of an efficient ID-based authenticated group key agreement protocol (ID-AGKA) has recently received much attention in  ... 
doi:10.13089/jkiisc.2013.23.1.003 fatcat:nxilk3drafelldsk52vedj7r2a

Privacy Preserving Schemes in Vanets: A Review

Shazia Sulthana
2018 International Journal for Research in Applied Science and Engineering Technology  
Privacy preservation based on pseudonyms and anonymous authentication to cover the original identity of the drivers cannot fully preserve the drivers' privacy.  ...  This survey will explore the various privacy requirements of the authentication during data delivery and as well as they way to authenticate the vehicles involved in communication.  ...  Lin et al. proposed a scheme based on a group signature . With this scheme, only a group public key and a private key are stored in the vehicle.  ... 
doi:10.22214/ijraset.2018.3354 fatcat:l4o24cgj4baafpfeemnmkobh74
« Previous Showing results 1 — 15 out of 180,499 results