ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
ACM Transactions on Computer Systems (TOCS)
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
An authentication and key distribution system for open network systems
ACM SIGOPS Operating Systems Review
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Several practical protocols for authentication and key exchange
Information Processing Letters
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
I: Basic technologies: Modern key agreement techniques
Computer Communications
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Recursive protocol for group-oriented authentication with key distribution
Journal of Systems and Software
A digital signature mechanism and authentication scheme for group communication in grid
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.24 |
Most of the previously proposed authentication mechanisms are based on the individual-oriented approach and hence may be inefficient and not suitable for group-oriented applications. In this paper, we propose a group-oriented authentication mechanism with key exchange that can effectively resolve the security requirements of group-oriented communications. The proposed mechanism consists of three basics: the entity-to-entity (EE), the entity-to-group (EG) and the group-to-group (GG) subprotocols. All these subprotocols meet the authentication and secure key exchange requirements separately addressed by other authors. By the proposed mechanism, a set of temporal authenticated subgroups can be recursively formed in a divide-and-conquer manner and finally all entities in the target group can authenticate each other and exchange a group session key. Experimental analyses show that the proposed mechanism requires O(n log n) rounds of messages (n is the number of entities in the target group) for achieving the authentication and key exchange among the entities in the target group, which outperforms the naive approach that is based on iteratively running either two-parties or three-parties authentication protocols for achieving the same purposes. Moreover, the proposed mechanism can be practically implemented in a large-scaled group-oriented application since only one-way hashing functions and exclusive-or operations are involved.