Group Authentication Based on Error Correction Coding Theory

WANG Hong, LI Jian-hua, LAI Cheng-zhe, QU Ning

ACTA ELECTRONICA SINICA ›› 2019, Vol. 47 ›› Issue (7) : 1393-1400.

PDF(718 KB)
CIE Homepage  |  Join CIE  |  Login CIE  |  中文 
PDF(718 KB)
ACTA ELECTRONICA SINICA ›› 2019, Vol. 47 ›› Issue (7) : 1393-1400. DOI: 10.3969/j.issn.0372-2112.2019.07.001

Group Authentication Based on Error Correction Coding Theory

  • WANG Hong1,2, LI Jian-hua1, LAI Cheng-zhe3, QU Ning2
Author information +

Abstract

Because it is difficult to identify bad signatures in group authentication schemes, the work is concerned with combinatorial group test based on error correction coding theory in digital communication system and a novel non-adaptive group authentication scheme is proposed. Firstly, the grouping algorithm of all nodes is proposed based on error correction coding theory; secondly, batch certification is implemented according to the groups; thirdly, bad signature is identified by iterative analyses; finally, an example is demonstrated. Complexity analyses show the identification times of the group authentication scheme of n signatures with r bad signatures is much less than n times of one-by-one authentication. Accuracy analyses show the probability of identification of the group authentication scheme is close to 1 when r is much less than n.

Key words

group authentication / combinatorial group test / error correction code

Cite this article

Download Citations
WANG Hong, LI Jian-hua, LAI Cheng-zhe, QU Ning. Group Authentication Based on Error Correction Coding Theory[J]. Acta Electronica Sinica, 2019, 47(7): 1393-1400. https://doi.org/10.3969/j.issn.0372-2112.2019.07.001

References

[1] 李中献,詹榜华,杨义先.认证理论与技术的发展[J].电子学报,1999,27(1):98-102. LI Zhong-xian,ZHAN Bang-hua,YANG Yi-xian.A survey of identification and authentication[J].Acta Electronica Sinica,1999,27(1):98-102.(in Chinese)
[2] 刘冬,陈晶,杜瑞颖,等.基于情景感知的低交互移动双因素认证系统[J].电子学报,2018,46(5):1056-1061. LIU Dong,CHEN Jing,DU Rui-ying,et al.A low interaction mobile two-factor authentication system based on context awareness[J].Acta Electronica Sinica,2018,46(5):1056-1061.(in Chinese)
[3] BONEH D,GENTRY C,LYNN B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[J].Advances in Cryptology-Eurocrypt,2003,2656(1):416-432.
[4] YANAI N.On the tightness of deterministic identity-based signatures[A].Proceedings of the Fourth International Symposium on Computing and Networking[C].Hiroshima,Japan:IEEE,2017.168-173.
[5] 张玉磊,周冬瑞,李臣意,等.高效的无证书广义指定验证者聚合签名方案[J].通信学报,2015,36(2):48-55. ZHANG Yulei,ZHOU Dongrui,LI Chenyi,et al.Certificateless-based efficient aggregate signature scheme with universal designated verifier[J].Journal on Communications,2015,36(2):48-55.(in Chinese)
[6] PASTUSZAK J,MICHATEK D,PIEPRZYK J,et al.Identification of bad signatures in batches[A].Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography:Public Key Cryptography[C].Imai:Springer-Verlag,2000.28-45.
[7] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803. LI Shun-dong,WANG Dao-shun.Efficient secure multiparty computation based on homomorphic encryption[J].Acta Electronica Sinica,2013,41(4):798-803.(in Chinese)
[8] GENTRY C,RAMZAN Z.Identity-based aggregate signatures[A].Proceedings of the International Conference on Theory and Practice of Public-Key Cryptography[C].New York:Springer-Verlag,2006.257-273.
[9] SHEN Li-min,MA Jian-feng,LIU Xi-meng,et al.A secure and efficient ID-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2017,4(2):546-553.
[10] IWASAKI T,YANAI N,INAMURA M,et al.Tightly-secure identity-based structured aggregate signature scheme under the computational Diffie-Hellman assumption[A].Proceedings of the International Conference on Advanced Information Networking and Applications[C].Crans-Montana,Switzerland:IEEE,2016.669-676.
[11] 庞辽军.秘密共享技术及其应用研究[D].西安:西安电子科技大学,2006.116-130. PANG Liao-jun.Secret Sharing Technology and Its Applications[D].Xi'an Shannxi:Xidian University,2006.116-130.(in Chinese)
[12] HARN L.Group authentication[J].IEEE Transactions on Computers,2013,62(9):1893-1898.
[13] LI S,DOH I,CHAE K.A group authentication scheme based on Lagrange interpolation polynomial[A].Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing[C].Blumenau,Brazil:IEEE,2016.386-391.
[14] MIAO F,JIANG H,JI Y,et al.Asynchronous group authentication[J].Chinese Journal of Electronics,2017,26(4):820-826.
[15] 季洋洋,苗付友,蒋辉文.简单的异步(t,m,n)组认证方案[J].计算机工程与应用,2016,52(15):8-12. JI Yang-yang,MIAO Fu-you,JIANG Hui-wen.Simple asynchronous (t,m,n) group authentication[J].Computer Engineering and Applications,2016,52(15):8-12.(in Chinese)
[16] LIU Qiang,YIN Jian-ping,LEUNG V C M,et al.FADE:forwarding assessment based detection of collaborative grey hole attacks in WMNs[J].IEEE Transactions on Wireless Communications,2013,12(10):5124-5136.
[17] PASTUSZAK J,PIEPRZYK J,SEBERRY,J.Codes identifying bad signatures in batches[J].Lecture Notes in Computer Science,2000,1977:143-154.
[18] ZAVERUCHA G M,STINSON D R.Group testing and batch verification[A].Proceedings of the International Conference on Information Theoretic Security LNCS5973[C].Berlin,Germany:Springer-Verlag,2009.140-157.
[19] DU D,HWANG F K,HWANG F.Combinatorial Group Testing and Its Applications[M].[S.L.]:World Scientific,2000.
[20] PASTUSZAK J,MICHALEK D,PIEPRZYK J,et al.Identification of bad signatures in batches[A].Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography:Public Key Cryptography[C].Imai:Springer,Heidelberg,2000.28-45.
[21] CHEN J,YUAN Q,XUE G,et al.Game-theory-based batch identification of invalid signatures in wireless mobile networks[A].Proceedings of the IEEE Conference on Computer Communications[C].Washington DC,USA:IEEE Computer Society,2015.262-270.
[22] ALDRIDGE M,BALDASSINI L,JOHNSON O.Group testing algorithms:bounds and simulation[J].IEEE Transactions on Information Theory,2013,59(6):7-16.
[23] CHAN C L,JAGGI S,SALIGRAMA V,et al.Non-adaptive group testing:explicit bonds and novel algorithms[A].Proceedings of the IEEE International Symposium on Information Theory[C].Cambridge,MA,USA:IEEE,2012.1837-1841.
[24] SHANGGUAN C,GE G.New bounds on the number of tests for disjunct matrices[J].IEEE Transactions on Information Theory,2016,62(12):7518-7521.
[25] LEE K,PEDARSANI R,RAMCHANDRAN K.Saffron:a fast,efficient,and robust framework for group testing based on sparse-graph codes[A].Proceedings of the IEEE International Symposium on Information Theory[C].Barcelona,Spain:IEEE,2016.2873-2877.
[26] BUI T V,KURIBAYASHI M,ECHIZEN I.Non-adaptive group testing framework based on concatenation code[J].IEEE Transactions on Information Theory,2017,63(5):1-12.
[27] BUI T V,KOJIMA T,KURIBAYASHI M,et al.Efficient (nonrandom) construction and decoding of non-adaptive group testing[J].IEEE Transactions on Information Theory,2018,64(11):1-15.
[28] PORAT E,ROTHSCHILD A.Explicit Non-Adaptive Combinatorial Group Testing Schemes[M].Germany:Springer Berlin Heidelberg,2008.7982-7989.

Funding

National Natural Science Foundation of China (No.61872293); Innovative Talent Introduction Project ---- Youth Nova Program for Science and Technology of Shaanxi Province (No.2017KJXX-47)
PDF(718 KB)

1239

Accesses

0

Citation

Detail

Sections
Recommended

/