http://iet.metastore.ingenta.com
1887

Multi-receiver authentication scheme with hierarchical structure

Multi-receiver authentication scheme with hierarchical structure

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Multi-receiver authentication plays an important role in network security. Many researchers have studied the constructions and the properties of the multi-receiver authentication scheme. However, most of these schemes treat the capability of all the receivers equally. In practice, receivers may have different other than equal powers in many cases. The authors consider the new scenario in the multi-receiver authentication. The authors propose a multi-receiver authentication scheme with hierarchical structure among the receivers. The authors construct an unconditionally secure multi-receiver authentication code by using the Birkhoff interpolation. The authentication scheme is also able to send multiple messages.

References

    1. 1)
      • G.J. Simmons .
        1. Simmons, G.J.: ‘Authentication theory/coding theory’. Crypto'84, 1984 (LNCS, 196), pp. 411431.
        . Crypto'84 , 411 - 431
    2. 2)
      • Y. Desmedt , Y. Frankel , M. Yung .
        2. Desmedt, Y., Frankel, Y., Yung, M.: ‘Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback’. IEEE INFOCOM1992, Eleventh Annual Joint Conf. of the IEEE Computer and Communications Societies, 1992, pp. 20452054.
        . IEEE INFOCOM1992, Eleventh Annual Joint Conf. of the IEEE Computer and Communications Societies , 2045 - 2054
    3. 3)
      • K. Kurosawa , S. Obana .
        3. Kurosawa, K., Obana, S.: ‘Characterization of (k,n) multi-receiver authentication’. Information Security and Privacy, ACISP'97, 1997 (LNCS, 1270), pp. 204215.
        . Information Security and Privacy, ACISP'97 , 204 - 215
    4. 4)
      • R. Safavi-Naini , H. Wang .
        4. Safavi-Naini, R., Wang, H.: ‘New results on multi-receiver authentication codes’. Eurocrypt'98, 1998 (LNCS, 1403), pp. 527541.
        . Eurocrypt'98 , 527 - 541
    5. 5)
      • A. Shamir .
        5. Shamir, A.: ‘How to share a secret’, Commun. ACM, 1979, 22 (11), pp. 612613.
        . Commun. ACM , 11 , 612 - 613
    6. 6)
      • J. Zhang , X. Li , F.-W. Fu .
        6. Zhang, J., Li, X., Fu, F.-W.: ‘Multi-receiver authentication scheme for multiple messages based on linear codes’. Information Security Practice and Experience, 2014 (LNCS, 8434), pp. 287301.
        . Information Security Practice and Experience , 287 - 301
    7. 7)
      • X. Li , J. Niu , M.K. Khan .
        7. Li, X., Niu, J., Khan, M.K., et al: ‘An enhanced smart card based remote user password authentication scheme’, J. Netw. Comput. Applic., 2013, 36, (5), pp. 13651371.
        . J. Netw. Comput. Applic. , 5 , 1365 - 1371
    8. 8)
      • X. Li , J. Niu , Z. Wang .
        8. Li, X., Niu, J., Wang, Z., et al: ‘Applying biometrics to design three-factor remote user authentication scheme with key agreement’, Secur. Commun. Netw., 2014, 7, (10), pp. 14881497.
        . Secur. Commun. Netw. , 10 , 1488 - 1497
    9. 9)
      • Y. Chang , W. Tai , H. Chang .
        9. Chang, Y., Tai, W., Chang, H.: ‘Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update’, Int. J. Commun. Syst., 2014, 27, (11), pp. 34303440.
        . Int. J. Commun. Syst. , 11 , 3430 - 3440
    10. 10)
      • X. Li , J. Niu , J. Liao .
        10. Li, X., Niu, J., Liao, J., et al: ‘Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update’, Int. J. Commun. Syst., 2015, 28, (2), pp. 374382.
        . Int. J. Commun. Syst. , 2 , 374 - 382
    11. 11)
      • S. Chen , L. An .
        11. Chen, S., An, L.: ‘Two constructions of multireceiver authentication codes from singular symplectic geometry over finite fields’, WSEAS Trans. Math., 2012, 11, (1), pp. 5463.
        . WSEAS Trans. Math. , 1 , 54 - 63
    12. 12)
      • S. Chen , D. Zhao .
        12. Chen, S., Zhao, D.: ‘Construction of multi-receiver multi-fold authentication codes from singular symplectic geometry over finite fields’, Algebra Colloq., 2013, 20, (4), pp. 701710.
        . Algebra Colloq. , 4 , 701 - 710
    13. 13)
      • X. Wang .
        13. Wang, X.: ‘A new construction of multi-receiver authentication codes from pseudo-symplectic geometry over finite fields’, arXivpreprint, 2013, arXiv: 1302.3160v3.
        .
    14. 14)
      • X. Wang .
        14. Wang, X.: ‘A new construction of multisender authentication codes from polynomials over finite fields’, J. Appl. Math., 2013, doi: 10.1155/2013/320392, accessed 11 Aug. 2016.
        . J. Appl. Math.
    15. 15)
      • R. Fuji-Hara , X. Li , Y. Miao .
        15. Fuji-Hara, R., Li, X., Miao, Y., et al: ‘A TWOOA construction for multi-receiver multi-message authentication codes’, J. Math. Crypt., 2008, 2, (1), pp. 928.
        . J. Math. Crypt. , 1 , 9 - 28
    16. 16)
      • T. Tassa .
        16. Tassa, T.: ‘Hierarchical threshold secret sharing’, J. Cryptol., 2007, 20, (2), pp. 237264.
        . J. Cryptol. , 2 , 237 - 264
    17. 17)
      • A. Beimel .
        17. Beimel, A.: ‘Secret-sharing schemes: A survey’. Proc. IWCC 2011, Qingdao, China, May 2011, (LNCS, 6639), pp. 1146.
        . Proc. IWCC 2011 , 11 - 46
    18. 18)
      • D.R. Stinson .
        18. Stinson, D.R.: ‘An explication of secret sharing schemes’, Des. Codes Cryptogr., 1992, 2, (4), pp. 357390.
        . Des. Codes Cryptogr. , 4 , 357 - 390
    19. 19)
      • X. Wang , F.-W. Fu , X. Guang .
        19. Wang, X., Fu, F.-W., Guang, X.: ‘Probabilistic secret sharing schemes for multipartite access structures’, IEICE Trans. Fundam., 2016, E99-A, (4), pp. 856862.
        . IEICE Trans. Fundam. , 4 , 856 - 862
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2016.0264
Loading

Related content

content/journals/10.1049/iet-ifs.2016.0264
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address