(t, m, n)-AS Group Authentication Scheme Based on Secret Sharing

Xiaoting HE,Fuyou MIAO,Liang FANG
DOI: https://doi.org/10.3969/j.issn.1000-3428.2018.01.026
2018-01-01
Abstract:In order to solve the problem that the existing group authentication schemes cannot identify the specific illegal participant,this paper proposes a centralized (t,m,n)-AS group authentication scheme based on Shamir secretsharing mechanism.First of all,it verifies whether all m participants are legal within O (1) time through the overall authentication.Then the scheme identifies all possible adversaries within O(m) time through single authentication in case of illegal participants.Analysis results show that the proposed scheme can resist the conspiring attacks of up to (t-1) members and prevent a non-member adversary with at most (m-1) intercepted tokens from passing authentication.In addition,it does not depend on any hard problem,which is theoretically secure.
What problem does this paper attempt to address?