A Group Key Establishment Scheme
Group authentication is a method of confirmation that a set of users belong to a group and of distributing a common key among them. Unlike the standard authentication schemes where one central authority authenticates users one by one, group authentication can handle the authentication process at onc...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Guzey, Sueda Kurt, Gunes Karabulut Ozdemir, Enver |
description | Group authentication is a method of confirmation that a set of users belong
to a group and of distributing a common key among them. Unlike the standard
authentication schemes where one central authority authenticates users one by
one, group authentication can handle the authentication process at once for all
members of the group. The recently presented group authentication algorithms
mainly exploit Lagrange's polynomial interpolation along with elliptic curve
groups over finite fields. As a fresh approach, this work suggests use of
linear spaces for group authentication and key establishment for a group of any
size. The approach with linear spaces introduces a reduced computation and
communication load to establish a common shared key among the group members.
The advantages of using vector spaces make the proposed method applicable to
energy and resource constrained devices. In addition to providing lightweight
authentication and key agreement, this proposal allows any user in a group to
make a non-member to be a member, which is expected to be useful for autonomous
systems in the future. The scheme is designed in a way that the sponsors of
such members can easily be recognized by anyone in the group. Unlike the other
group authentication schemes based on Lagrange's polynomial interpolation, the
proposed scheme doesn't provide a tool for adversaries to compromise the whole
group secrets by using only a few members' shares as well as it allows to
recognize a non-member easily, which prevents service interruption attacks. |
doi_str_mv | 10.48550/arxiv.2109.15037 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2109_15037</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2109_15037</sourcerecordid><originalsourceid>FETCH-LOGICAL-a677-566d183db0a8e2d55070115439cd65eff250fb9e464a9dac4a5f7bb38d0828983</originalsourceid><addsrcrecordid>eNotzrsOgjAYhuEuDka9ACd7A2BLz6MhnqKJg-7kL20DCagpaPTuPU7f9n4PQlNKUq6FIHOIj_qeZpSYlArC1BDhBV7Hy-2Kd_6Jl10Ptqm7qvXnHh_Lyrd-jAYBms5P_jtCp9XylG-S_WG9zRf7BKRSiZDSUc2cJaB95t5filAqODOlk8KHkAkSrPFccjAOSg4iKGuZdkRn2mg2QrNf9kssrrFuIT6LD7X4UtkLL903Hw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Group Key Establishment Scheme</title><source>arXiv.org</source><creator>Guzey, Sueda ; Kurt, Gunes Karabulut ; Ozdemir, Enver</creator><creatorcontrib>Guzey, Sueda ; Kurt, Gunes Karabulut ; Ozdemir, Enver</creatorcontrib><description>Group authentication is a method of confirmation that a set of users belong
to a group and of distributing a common key among them. Unlike the standard
authentication schemes where one central authority authenticates users one by
one, group authentication can handle the authentication process at once for all
members of the group. The recently presented group authentication algorithms
mainly exploit Lagrange's polynomial interpolation along with elliptic curve
groups over finite fields. As a fresh approach, this work suggests use of
linear spaces for group authentication and key establishment for a group of any
size. The approach with linear spaces introduces a reduced computation and
communication load to establish a common shared key among the group members.
The advantages of using vector spaces make the proposed method applicable to
energy and resource constrained devices. In addition to providing lightweight
authentication and key agreement, this proposal allows any user in a group to
make a non-member to be a member, which is expected to be useful for autonomous
systems in the future. The scheme is designed in a way that the sponsors of
such members can easily be recognized by anyone in the group. Unlike the other
group authentication schemes based on Lagrange's polynomial interpolation, the
proposed scheme doesn't provide a tool for adversaries to compromise the whole
group secrets by using only a few members' shares as well as it allows to
recognize a non-member easily, which prevents service interruption attacks.</description><identifier>DOI: 10.48550/arxiv.2109.15037</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2021-09</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2109.15037$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2109.15037$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Guzey, Sueda</creatorcontrib><creatorcontrib>Kurt, Gunes Karabulut</creatorcontrib><creatorcontrib>Ozdemir, Enver</creatorcontrib><title>A Group Key Establishment Scheme</title><description>Group authentication is a method of confirmation that a set of users belong
to a group and of distributing a common key among them. Unlike the standard
authentication schemes where one central authority authenticates users one by
one, group authentication can handle the authentication process at once for all
members of the group. The recently presented group authentication algorithms
mainly exploit Lagrange's polynomial interpolation along with elliptic curve
groups over finite fields. As a fresh approach, this work suggests use of
linear spaces for group authentication and key establishment for a group of any
size. The approach with linear spaces introduces a reduced computation and
communication load to establish a common shared key among the group members.
The advantages of using vector spaces make the proposed method applicable to
energy and resource constrained devices. In addition to providing lightweight
authentication and key agreement, this proposal allows any user in a group to
make a non-member to be a member, which is expected to be useful for autonomous
systems in the future. The scheme is designed in a way that the sponsors of
such members can easily be recognized by anyone in the group. Unlike the other
group authentication schemes based on Lagrange's polynomial interpolation, the
proposed scheme doesn't provide a tool for adversaries to compromise the whole
group secrets by using only a few members' shares as well as it allows to
recognize a non-member easily, which prevents service interruption attacks.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzrsOgjAYhuEuDka9ACd7A2BLz6MhnqKJg-7kL20DCagpaPTuPU7f9n4PQlNKUq6FIHOIj_qeZpSYlArC1BDhBV7Hy-2Kd_6Jl10Ptqm7qvXnHh_Lyrd-jAYBms5P_jtCp9XylG-S_WG9zRf7BKRSiZDSUc2cJaB95t5filAqODOlk8KHkAkSrPFccjAOSg4iKGuZdkRn2mg2QrNf9kssrrFuIT6LD7X4UtkLL903Hw</recordid><startdate>20210930</startdate><enddate>20210930</enddate><creator>Guzey, Sueda</creator><creator>Kurt, Gunes Karabulut</creator><creator>Ozdemir, Enver</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20210930</creationdate><title>A Group Key Establishment Scheme</title><author>Guzey, Sueda ; Kurt, Gunes Karabulut ; Ozdemir, Enver</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a677-566d183db0a8e2d55070115439cd65eff250fb9e464a9dac4a5f7bb38d0828983</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Guzey, Sueda</creatorcontrib><creatorcontrib>Kurt, Gunes Karabulut</creatorcontrib><creatorcontrib>Ozdemir, Enver</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guzey, Sueda</au><au>Kurt, Gunes Karabulut</au><au>Ozdemir, Enver</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Group Key Establishment Scheme</atitle><date>2021-09-30</date><risdate>2021</risdate><abstract>Group authentication is a method of confirmation that a set of users belong
to a group and of distributing a common key among them. Unlike the standard
authentication schemes where one central authority authenticates users one by
one, group authentication can handle the authentication process at once for all
members of the group. The recently presented group authentication algorithms
mainly exploit Lagrange's polynomial interpolation along with elliptic curve
groups over finite fields. As a fresh approach, this work suggests use of
linear spaces for group authentication and key establishment for a group of any
size. The approach with linear spaces introduces a reduced computation and
communication load to establish a common shared key among the group members.
The advantages of using vector spaces make the proposed method applicable to
energy and resource constrained devices. In addition to providing lightweight
authentication and key agreement, this proposal allows any user in a group to
make a non-member to be a member, which is expected to be useful for autonomous
systems in the future. The scheme is designed in a way that the sponsors of
such members can easily be recognized by anyone in the group. Unlike the other
group authentication schemes based on Lagrange's polynomial interpolation, the
proposed scheme doesn't provide a tool for adversaries to compromise the whole
group secrets by using only a few members' shares as well as it allows to
recognize a non-member easily, which prevents service interruption attacks.</abstract><doi>10.48550/arxiv.2109.15037</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2109.15037 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2109_15037 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security |
title | A Group Key Establishment Scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T18%3A23%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Group%20Key%20Establishment%20Scheme&rft.au=Guzey,%20Sueda&rft.date=2021-09-30&rft_id=info:doi/10.48550/arxiv.2109.15037&rft_dat=%3Carxiv_GOX%3E2109_15037%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |