Volume 19, Issue 1 (March 2023)                   IJEEE 2023, 19(1): 2520-2520 | Back to browse issues page


XML Print


Abstract:   (884 Views)
Shamir’s secret sharing scheme is one of the substantial threshold primitives, based on which many security protocols are constructed such as group authentication schemes. Notwithstanding the unconditional security of Shamir's secret sharing scheme, protocols that are designed based on this scheme do not necessarily inherit this property. In this work, we evaluate the security of a lightweight group authentication scheme, introduced for IoT networks in IEEE IoT Journal in 2020, and prove its weakness against the linear subspace attack, which is a recently-proposed cryptanalytical method for secret sharing-based schemes. Then, we propose an efficient and attack-resistant group authentication protocol for IoT networks.
Full-Text [PDF 528 kb]   (629 Downloads)    
Type of Study: Research Paper | Subject: Communication Systems
Received: 2022/05/15 | Revised: 2023/06/06 | Accepted: 2022/11/08

Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.