Provably Secure Group Authentication in the Asynchronous Communication Model

Zhe Xia*, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review


Authentication is one of the most fundamental services in information security. Compared with traditional authentication methods, group authentication enables a group of users to be authenticated at once rather than authenticating each user individually. Therefore, it is preferred in the group-oriented environment, such as multicast/conference communications. While several group authentication schemes have been proposed over the past few years, no formal treatment for this cryptographic problem has ever been suggested. Existing papers only provide heuristic evidences of security and some of these schemes have later been found to be flawed. In this paper, we present a formal security model for this problem. Our model not only captures the basic requirement in group authentication that an adversary cannot pretend to be a group member without being detected, but also considers some desirable features in real-world applications, such as re-use of the credentials in multiple authentication sessions and allowance for users to exchange messages through asynchronous networks. We then introduce an efficient group authentication scheme where its security can be reduced to some well-studied complexity theoretic assumptions.

Original languageEnglish
Title of host publicationInformation and Communications Security - Revised Selected Papers
EditorsJianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu
Publication date1 Jan 2020
ISBN (Print)9783030415785
Publication statusPublished - 1 Jan 2020
Event21st International Conference on Information and Communications Security, ICICS 2019 - Beijing, China
Duration: 15 Dec 201917 Dec 2019


Conference21st International Conference on Information and Communications Security, ICICS 2019
SeriesLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11999 LNCS


Dive into the research topics of 'Provably Secure Group Authentication in the Asynchronous Communication Model'. Together they form a unique fingerprint.

Cite this