Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Multi-receiver authentication scheme with hierarchical structure

Multi-receiver authentication plays an important role in network security. Many researchers have studied the constructions and the properties of the multi-receiver authentication scheme. However, most of these schemes treat the capability of all the receivers equally. In practice, receivers may have different other than equal powers in many cases. The authors consider the new scenario in the multi-receiver authentication. The authors propose a multi-receiver authentication scheme with hierarchical structure among the receivers. The authors construct an unconditionally secure multi-receiver authentication code by using the Birkhoff interpolation. The authentication scheme is also able to send multiple messages.

References

    1. 1)
      • 8. Li, X., Niu, J., Wang, Z., et al: ‘Applying biometrics to design three-factor remote user authentication scheme with key agreement’, Secur. Commun. Netw., 2014, 7, (10), pp. 14881497.
    2. 2)
      • 7. Li, X., Niu, J., Khan, M.K., et al: ‘An enhanced smart card based remote user password authentication scheme’, J. Netw. Comput. Applic., 2013, 36, (5), pp. 13651371.
    3. 3)
      • 11. Chen, S., An, L.: ‘Two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields’, WSEAS Trans. Math., 2012, 11, (1), pp. 5463.
    4. 4)
      • 9. Chang, Y., Tai, W., Chang, H.: ‘Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update’, Int. J. Commun. Syst., 2014, 27, (11), pp. 34303440.
    5. 5)
      • 2. Desmedt, Y., Frankel, Y., Yung, M.: ‘Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback’. IEEE INFOCOM1992, Eleventh Annual Joint Conf. of the IEEE Computer and Communications Societies, 1992, pp. 20452054.
    6. 6)
      • 12. Chen, S., Zhao, D.: ‘Construction of multi-receiver multi-fold authentication codes from singular symplectic geometry over finite fields’, Algebra Colloq., 2013, 20, (4), pp. 701710.
    7. 7)
      • 17. Beimel, A.: ‘Secret-sharing schemes: A survey’. Proc. IWCC 2011, Qingdao, China, May 2011, (LNCS, 6639), pp. 1146.
    8. 8)
      • 14. Wang, X.: ‘A new construction of multisender authentication codes from polynomials over finite fields’, J. Appl. Math., 2013, doi: 10.1155/2013/320392, accessed 11 Aug. 2016.
    9. 9)
      • 19. Wang, X., Fu, F.-W., Guang, X.: ‘Probabilistic secret sharing schemes for multipartite access structures’, IEICE Trans. Fundam., 2016, E99-A, (4), pp. 856862.
    10. 10)
      • 3. Kurosawa, K., Obana, S.: ‘Characterization of (k,n) multi-receiver authentication’. Information Security and Privacy, ACISP'97, 1997 (LNCS, 1270), pp. 204215.
    11. 11)
      • 18. Stinson, D.R.: ‘An explication of secret sharing schemes’, Des. Codes Cryptogr., 1992, 2, (4), pp. 357390.
    12. 12)
      • 4. Safavi-Naini, R., Wang, H.: ‘New results on multi-receiver authentication codes’. Eurocrypt'98, 1998 (LNCS, 1403), pp. 527541.
    13. 13)
      • 1. Simmons, G.J.: ‘Authentication theory/coding theory’. Crypto'84, 1984 (LNCS, 196), pp. 411431.
    14. 14)
      • 16. Tassa, T.: ‘Hierarchical threshold secret sharing’, J. Cryptol., 2007, 20, (2), pp. 237264.
    15. 15)
      • 5. Shamir, A.: ‘How to share a secret’, Commun. ACM, 1979, 22 (11), pp. 612613.
    16. 16)
      • 10. Li, X., Niu, J., Liao, J., et al: ‘Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update’, Int. J. Commun. Syst., 2015, 28, (2), pp. 374382.
    17. 17)
      • 13. Wang, X.: ‘A new construction of multi-receiver authentication codes from pseudo-symplectic geometry over finite fields’, arXivpreprint, 2013, arXiv: 1302.3160v3.
    18. 18)
      • 15. Fuji-Hara, R., Li, X., Miao, Y., et al: ‘A TWOOA construction for multi-receiver multi-message authentication codes’, J. Math. Crypt., 2008, 2, (1), pp. 928.
    19. 19)
      • 6. Zhang, J., Li, X., Fu, F.-W.: ‘Multi-receiver authentication scheme for multiple messages based on linear codes’. Information Security Practice and Experience, 2014 (LNCS, 8434), pp. 287301.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0264
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0264
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address