Citation: | MIAO Fuyou, JIANG Huiwen, JI Yangyang, et al., “Asynchronous Group Authentication,” Chinese Journal of Electronics, vol. 26, no. 4, pp. 820-826, 2017, doi: 10.1049/cje.2016.08.015 |
N. Aboudagga, J.J. Quisquater and M. Eltoweissy, “Group authentication protocol for mobile networks”, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications IEEE, New York, USA, pp.28-28, 2007.
|
Y.W. Chen, J.T.Wang and K.H. Chi, “Group-based authentication and key agreement”, Wireless Personal Communications, Vol.62, No.4, pp.965-979, 2012.
|
S. Sprague, “Method and system for user and group authentication with pseudo-anonymity over a public network”, Patent Application, 09/906,375, U.S., 2001-7-16.
|
H. Yang, L. Jiao and V.A. Oleshchuk , “A general framework for group authentication and key exchange protocols”, Foundations and Practice of Security. Springer International Publishing, pp.31-45, 2014.
|
F. Wang, C.C. Chang and Y.C. Chou, “Group authentication and group key distribution for Ad Hoc networks”, International Journal of Network Security, Vol.17, No.2, pp.199-207, 2015.
|
S.B. Guthery, “Group Authentication Using the Naccache-Stern Public-Key Cryptosystem ”, arXiv.org>cs>arXiv:cs/0307059, 2003.
|
L.A. Martucci, T. Carvalho and W.V. Ruggiero, “A lightweight distributed group authentication mechanism”, INC2004-Fourth International Network Conference, pp.393-400, 2004.
|
A. Shamir, “How to share a secret”, Communications of the ACM, Vol.22, No.11, pp.612-613, 1979.
|
C. Asmuth and J. Bloom, “A modular approach to key safeguarding”, IEEE Transactions on Information Theory, Vol.30, No.2, pp.208-210, 1983.
|
L. Harn, “Group authentication”, IEEE Transactions on Computers, Vol.62, No.9, pp.1893-1898, 2013.
|
P.N. Mahalle, N.R. Prasad and R. Prasad, “Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT)”, 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE) IEEE, pp.1-5, 2014.
|
F.Y. Miao, Y. Xiong and X.F. Wang, “Randomized component and its application to (t,m,n)-group oriented secret sharing”, IEEE Transactions on Information Forensics and Security, Vol.10, No.5, pp.889-899, 2015.
|
F.Y. Miao and Y.Y. Fan,“ A (t,m,n)-group oriented secret sharing scheme”, Chinese Journal of Electronics, Vol.24, No.4, pp.174-178, 2015.
|
M. Mignotte, “How to share a secret”, Cryptography-EUROCRYPTO'82, LNCS, Vol.149, pp.371-375, 1983.
|