Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 3109624, 7 pages
https://doi.org/10.1155/2017/3109624
Research Article

Group Authentication with Multiple Trials and Multiple Authentications

Department of Information Management, National Chi Nan University, 470 University Road, Puli, Taiwan

Correspondence should be addressed to Hung-Yu Chien; wt.ude.uncn@neihcyh

Received 20 January 2017; Revised 22 April 2017; Accepted 27 April 2017; Published 28 May 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Hung-Yu Chien. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Kim, J.-Y. Choi, and J. Jeong, “On authentication signaling costs in hierarchical LTE networks,” in Proceedings of 7th International Conference on <italic>Ubi-Media Computing and Workshops</italic>, U-MEDIA 2014, pp. 11–16, Ulaanbaatar, Mongolia, July 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Li, M. Wen, and T. Zhang, “Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks,” IEEE Internet of Things Journal, vol. 3, no. 3, pp. 408–417, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, 1979. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. L. Harn, “Group authentication,” IEEE Transactions on Computers, vol. 62, no. 9, pp. 1893–1898, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  5. J.-L. Beuchat, J. E. G. Díaz, S. Mitsunari, E. Okamoto, F. Rodríguez-Henríquez, and T. Teruya, High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves,” IACR Eprint, 2010/354, https://eprint.iacr.org/2010/354.pdf.
  6. A. Jurisic and A. J. Menezes, Elliptic Curves and Cryptography, Certicom Whitepaper, 1997.
  7. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proceeding of the Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer-Verlag, Santa Barbara, Calif, USA, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  8. National Security Agency, the US, “The Case for Elliptic Curve Cryptography”, https://www.nsa.gov/business/programs/elliptic_curve.shtml. Accessed 25 Dec. 2014.