AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS



Similar documents
A Secure Password-Authenticated Key Agreement Using Smart Cards

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

Provably Secure Single Sign-on Scheme in Distributed Systems and Networks

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

Trivial lump sum R5.0

Recurrence. 1 Definitions and main statements

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

An Interest-Oriented Network Evolution Mechanism for Online Communities

Scalable and Secure Architecture for Digital Content Distribution

An RFID Distance Bounding Protocol

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing

Fast Variants of RSA

Inter-domain Alliance Authentication Protocol Based on Blind Signature

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

Practical PIR for Electronic Commerce

3C-Auth: A New Scheme for Enhancing Security

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

IT09 - Identity Management Policy

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

How To Get A Tax Refund On A Retirement Account

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

Financial Mathemetics

PKIS: practical keyword index search on cloud datacenter

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

An Efficient Recovery Algorithm for Coverage Hole in WSNs

Support Vector Machines

BERNSTEIN POLYNOMIALS

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

An Alternative Way to Measure Private Equity Performance

Secure Network Coding Over the Integers

Simple Interest Loans (Section 5.1) :

ThresPassport A Distributed Single Sign-On Service

Mathematical Framework for A Novel Database Replication Algorithm

A role based access in a hierarchical sensor network architecture to provide multilevel security

Extending Probabilistic Dynamic Epistemic Logic

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

J. Parallel Distrib. Comput.

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST)

Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems

What is Candidate Sampling

Secure and Efficient Proof of Storage with Deduplication

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

A Study on Secure Data Storage Strategy in Cloud Computing

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

A Generalized Temporal and Spatial Role-Based Access Control Model

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

Canon NTSC Help Desk Documentation

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

Relay Secrecy in Wireless Networks with Eavesdropper

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

LIFETIME INCOME OPTIONS

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , info@teltonika.

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

Ensuring Data Storage Security in Cloud Computing

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

A Crossplatform ECG Compression Library for Mobile HealthCare Services

Ensuring Data Storage Security in Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

Project Networks With Mixed-Time Constraints

Fast degree elevation and knot insertion for B-spline curves

Certificate Revocation using Fine Grained Certificate Space Partitioning

Can Auto Liability Insurance Purchases Signal Risk Attitude?

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

Mining Multiple Large Data Sources

RequIn, a tool for fast web traffic inference

Ad-Hoc Games and Packet Forwardng Networks

Research of Network System Reconfigurable Model Based on the Finite State Automation

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

Fully Homomorphic Encryption Scheme with Symmetric Keys

Using Series to Analyze Financial Situations: Present Value

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

A Performance Analysis of View Maintenance Techniques for Data Warehouses

An Optimally Robust Hybrid Mix Network (Extended Abstract)

Transcription:

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence Electrcal Engneerng, Unversty of Mssour-Kansas Cty, MO 64110, USA harnl@umkc.edu 2 Key Laboratory of Network Securty and Cryptology, Fuan Normal Unversty, Fuan, 35007, P. R. Chna ABSTRACT clln@fnu.edu.cn Group communcaton mples a many-to-many communcaton and t goes beyond both one-to-one communcaton (.e., uncast) and one-to-many communcaton (.e., multcast). Unlke most user authentcaton protocols that authentcate a sngle user each tme, we propose a new type of authentcaton, called group authentcaton, that authentcates all users n a group at once. The group authentcaton protocol s specally desgned to support group communcatons. There s a group manager who s responsble to manage the group communcaton. Durng regstraton, each user of a group obtans an unque token from the group manager. Users present ther tokens to determne whether they all belong to the same group or not. The group authentcaton protocol allows users to reuse ther tokens wthout compromsng the securty of tokens. In addton, the group authentcaton can protect the dentty of each user. KEYWORDS User authentcaton; Group communcaton; Secret sharng; Ad hoc network; Strong t -consstency 1. INTRODUCTION User authentcaton s one of the most mportant securty servces n computer and communcaton applcaton. Knowledge based authentcaton (e.g., password) [16,9] and key based authentcaton (e.g., publc/prvate key) [7,12] are the two most popular approaches. Knowledge based authentcaton has some securty flaws. Most users lke to use smple and short passwords. However, Internet hackers can easly crack smple passwords. Publc-key based authentcaton needs a certfcate authorty (CA) to provde the authentcty of publc keys. In addton, publc-key computatons nvolve large ntegers. Computatonal tme s one of the man concerns for publc-key based authentcaton. All user authentcaton protocols [10,6] are one-to-one type of authentcaton where the prover nteracts wth the verfer to prove the dentty of the prover. For example, the RSA dgtal sgnature [13] s used to authentcate the sgner of the sgnature. In ths approach, the verfer sends a random challenge to the prover. Then, the prover dgtally sgns the random challenge and returns the dgtal sgnature of the challenge to the verfer. After successfully verfyng the dgtal sgnature, the verfer s convnced that the prover s the one wth the dentty of the publc key used to verfy the dgtal sgnature. In wreless communcatons, when a moble subscrber wants to establsh a connecton wth the base staton, the subscrber and the base staton nteract to DOI : 10.5121/nsa.2013.5302 09

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 establsh mutual authentcaton. Mutual authentcaton can prevent an llegtmate subscrber from usng the servce and prevent the fake base staton from harmng the subscrber. Network applcatons are no longer ust one-to-one communcaton; but nvolve multple users ( 2). Group communcaton [14,2] mples a many-to-many communcaton and t goes beyond both one-to-one communcaton (.e., uncast) and one-to-many communcaton (.e., multcast). In ths paper, we propose a new type of authentcaton, called group authentcaton, whch authentcates all users n a group at once. The group authentcaton protocol s specally desgned to support group communcatons. The group authentcaton s defned to nvolve multple users and users want to convnce each other that they all belong to the same group wthout revealng ther denttes. In the group authentcaton, each user acts as both the prover and the verfer. Group authentcaton s extremely mportant n an ad hoc network because ths network s temporarly establshed by multple users and these users want to use ths network to exchange secret nformaton. Devsng protocols to provde group authentcaton n ad hoc networks s extremely challengng due to hghly dynamc and unpredctable topologcal changes. As a result, there are two popular models to provde group authentcaton servces n an ad hoc network. The frst model nvolves a centralzed authentcaton server (AS) [11,3] and the second model has no AS [5,4]. In the frst model, AS manages the access rghts of the network. For example, Bhakt et al. [3] proposed to adopt Extensble Authentcaton Protocol (EAP) n the IEEE 802.1x standard for wreless ad hoc network. Ths approach requres to set up the AS and have moble users to access to the AS servce. In fact, n some stuatons, the second model s the only way to provde group authentcaton. For example, n an ad-hoc network communcaton, there has no AS servce avalable to moble users. In the second model, each user needs to take n charge of authentcatng other users. In a straghtforward approach, f there are n users n the group, each user can use the one-to-one authentcaton protocol for n 1 tmes to authentcate other users. Computatonal tme s one of the maor concerns n ths approach. In ths paper, we ntroduce a specal type of group authentcaton whch provdes an effcent way to authentcate multple users belongng to the same group wthout revealng dentty of each user. Our proposed protocol s no longer a one-to-one type of authentcaton. It s a many-to-many type of authentcaton. Unlke most user authentcaton protocols that authentcate a sngle user each tme, our proposed protocol authentcates all users of a group at once. In our proposal, each user needs to regster wth a group manager (GM) to become a group user. Lke the trusted dealer n Shamr's (, tn ) secret sharng scheme [15], the GM needs to select a secret polynomal and compute token for each user. Based on these tokens, our protocol can establsh group authentcaton for all users at once. The group authentcaton protocol allows users to reuse ther tokens wthout compromsng the securty of tokens. Our proposed protocol supports exstng wreless communcaton network ncludng wreless ad hoc network. The rest of ths paper s organzed as follows. In next secton, we nclude some prelmnares. In Secton 3, we ntroduce the model of our proposed group authentcaton. In Secton 4, we present basc one-tme group authentcaton protocol; n Secton 5, we present group authentcaton protocol wthout revealng tokens. We conclude n Secton 6. 10

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 2. PRELIMINARIES 2.1. Revew of Shamr's secret sharng scheme [15] In Shamr's ( tn, ) secret sharng scheme based on the polynomal, there are n shareholders and a mutually trusted dealer. The scheme conssts of two algorthms: a) Share generaton algorthm: the dealer frst pcks a random polynomal of degree t 1, t 1 f( x) at 1x a1xa0 mod p, such that the secret s satsfes f (0) a0 s and all coeffcents, a 0,a 1,..a t-1 Z P, p s a prme wth p s. The dealer computes shares, f ( x ), for 1, 2,, n, and dstrbutes each share f ( x ) to shareholder U secretly. b) Secret reconstructon algorthm: t takes any t or more than t shares, for example, shares (.e., t n), ( x1, f( x1)),( x2, f( x2)),,( x, f( x)), as nputs, and outputs the secret s usng Lagrange nterpolatng formula as x s f( x ) mod p. r 1 r1, r x xr We note that the above algorthms satsfy the basc requrements of the secret sharng scheme, that are, (1) wth the knowledge of any t or more than t shares, shareholders can reconstruct the secret s ; and (2) wth the knowledge of any t 1 or fewer than t 1 shares, shareholders cannot obtan the secret s. Shamr's secret sharng scheme s uncondtonally secure snce the scheme satsfes these two requrements wthout makng any computatonal assumpton. For more nformaton on ths scheme, please refer to the orgnal paper [15]. 2.2. Harn and Ln's defnton on strong t -consstency [8] Benaloh [1] presented a noton of t -consstency to determne whether a set of shares s generated from a polynomal of degree t 1 at most. Recently, Harn and Ln [8] proposed a new defnton of strong t -consstency whch s the extenson of Benaloh's defnton. Defnton 1 (Strong t -consstency [8]). A set of n shares (.e., t n) s sad to be strong t - consstent f (a) any subset of t or more than t shares can reconstruct the secret, and (b) any subset of fewer than t shares cannot reconstruct the secret. It s obvous that f shares n Shamr's secret sharng scheme are generated by a polynomal wth degree t 1 exactly, then shares satsfy the securty requrements of a ( tn, ) secret sharng scheme and these shares are also strong t -consstent. Checkng strong t -consstency of n shares can be executed very effcently by usng Lagrange nterpolatng formula. In fact, to check whether n shares are strong t -consstent or not, t only needs to check whether the nterpolaton of n shares yelds a polynomal wth degree t 1 exactly. If ths condton s satsfed, we can conclude that all shares are strong t -consstent. However, f there are some llegtmate shares, the degree of the nterpolatng polynomal of these n shares s more than t 1 wth very hgh probablty. In other words, these n shares are most lkely to be not strong t -consstent. The property of strong t -consstency wll be used n Secton 5 of our protocol to check strong t -consstency of n shares wthout revealng tokens. 11

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 3. MODEL 3.1. Enttes a) Group Manager (GM): A group manager s responsble to regster users to form a group. The responsblty of GM s to ssue a secret token to each user durng regstraton. Later, authentcaton s based on the secret tokens. Snce tokens are used n authentcaton, denttes of users are protected. In order to prevent malcous users to reveal ther tokens to attackers, each token s a unque nteger. The secret tokens are shares of the polynomal generated by the GM. b) Group Users: Jon a group and become a group user, each user needs to regster wth the GM. After beng successfully regstered, each user receves a secret token from the GM. Each user wth a unque token can prevent malcous users to gve ther tokens to mpersonators. c) Attackers: We consder two types of attackers, the nsde attackers and the outsde attackers. The nsde attackers are users who are legtmate users and own legtmate tokens from the GM. We consder that the nsder attackers may collude to forge tokens for non-users. The outsde attackers are mpersonators who do not own any tokens and try to mpersonate users to fal the authentcaton protocol. We also assume that the GM does not collude wth any user. If the GM colludes wth any user by revealng the secret of the GM to the user, the colluded user can do harm to the group. In addton, we assume all users act honestly n the authentcaton. If any use acts dshonestly by revealng a nvald value, the authentcaton s faled. 3.2. Authentcaton outcomes There are only two possble outcomes of a group authentcaton; that are, ether yes or no. If the outcome s yes, t means that all users belong to the same group; otherwse, there are mpersonators. 4. BASIC ONE-TIME GROUP AUTHENTICATION PROTOCOL In the followng dscusson, we assume that there are n users, M1, M2,, Mn, regstered at the GM to form a group. 4.1. System set up Durng regstraton, GM constructs a random ( t 1) -th (.e., t n) degree polynomal f ( x ) wth f (0) s, and computes secret tokens of users as y f( x), for 1, 2,, n, where x s the publc nformaton assocated wth user M. GM sends each token y to user M secretly. GM makes H() s publcly known, where H s a one-way functon. Remark 1. The threshold t s an mportant securty parameter that affects the securty of group authentcaton protocols. Usng a ( tn, ) secret sharng scheme to ssue tokens n the regstraton can prevent up to t 1 nsde attackers, who are legtmate users, colluded together to forge tokens. 12

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 4.2. Basc one-tme group authentcaton protocol From now on, we assume that there are users wth ther tokens f ( x1), f( x2),, f( x ) where t n, who want to execute the group authentcaton protocol. The basc dea of ths protocol s that each user releases the token obtaned from the GM durng regstraton. If all released tokens are vald, the nterpolaton of the released tokens can reconstruct the secret s. The publshed one-way hash of the secret s used to compare wth the one-way hash of the reconstructed secret. Theorem 1. Protocol 1 can detect any number of llegtmate users. Proof. If there s llegtmate user who does not own a vald token on the polynomal f ( x ), the reconstructed secret wll be dfferent from the secret s. Thus, Protocol 1 can detect any number of llegtmate users. Protocol 1: One-tme group authentcaton protocol Step 1. Each user M reveals hs token f ( x ), to all other users smultaneously. Step 2. After knowng all tokens, f ( x ), for 1, 2,,, followng Lagrange nterpolatng xr formula, each user computes s f( x ) mod p. If H ( s) H( s), all 1 r1, r x xr users have been authentcated successfully; otherwse, there are llegtmate users. Remark 2. Ths s a one-tme authentcaton protocol snce the secret and tokens are revealed to all users n ths protocol. The authentcaton s no longer a one-to-one authentcaton and t s a many-to-many authentcaton. The proposed protocol s very effcent to authentcate multple users belongng to the same group wthout revealng dentty of each user. 5. GROUP AUTHENTICATION PROTOCOL WITHOUT REVEALING TOKENS In Protocol 1, snce tokens are revealed to all users, each token can only be used for one-tme authentcaton. In addton, the secret s s also exposed to users n Protocol 1. In the followng dscusson, we propose a way to protect tokens. In addton, the secret does not need to be recovered n each authentcaton. Our authentcaton s based on the property of strong t - consstency n Secton 2.2. 5.1. Group authentcaton protocol wthout revealng tokens In the followng protocol, t can be acheved authentcaton wthout revealng tokens and the secret. The basc dea of our approach uses the property of strong t -consstency. Let each user select a random polynomal wth ( t 1) -th degree and generate shares for other users. Then, each user releases the addtve sum of hs own token obtaned from the GM durng the regstraton and sum of shares of polynomals generated by users. Due to the property of secret 13

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 Protocol 2: Group authentcaton protocol wthout revealng tokens Step 1. Each user M selects a random polynomal, f ( x ), wth ( t 1) -th degree. For the polynomal f ( x ), user M computes shares as f( x r), for r 1, 2,,, r, for other users. User M sends each share, f( x r) to user M r secretly. Step 2. After recevng fr( x ) for r 1, 2,,, each user uses hs token f ( x ) to compute y f( x ) f ( x ) mod p. Each user releases hs value y. r r1 Step 3. After knowng y, for 1, 2,,, each user checks whether they are strong t - consstent. If they are not strong t -consstent, there are llegtmate users; else, all users have been successfully authentcated belongng to the same group. sharng homomorphsm n Secton 2.2, the released sums are shares of the secret polynomal f ( x ) of tokens and sum of polynomals generated by users. If all users act honestly and own vald tokens, the released sums should be strong t -consstent; otherwse, the released sums are not strong t -consstent. Snce users do not need to reconstruct the secret n the protocol and the tokens have not been revealed drectly, the dealer does not need to publsh the one-way of the secret s durng system set up and the tokens can be reused. Theorem 2. Protocol 2 can detect any number of llegtmate users. Proof. Due to the property of secret sharng homomorphsm, each released value, y n Step 2 s f ( x) f ( x) mod p, wth ( t 1) -th degree. the share of addtve sum of polynomals, Thus, n Step 3, all released values, r1 llegtmate user who does not own a vald token, f ( x ) 1, 2,, r y, for 1, 2,,, are strong t -consstent. If there s any, the released values, y, for, are not strong t -consstent wth very hgh probablty. Remark 3. In Step 2, the token f ( x ) cannot be computed from the revealed value y f( x ) f ( x ) mod p. Therefore, the tokens are protected uncondtonally and can r r1 be reused for multple authentcatons. 5.2. Computatonal complexty The most tme-consumng operaton for each user s to check the strong t -consstency of released values y for 1, 2,,, n Step 3 of Protocol 2. Followng our dscusson presented n Secton 2.2, checkng strong t -consstency needs to compute the nterpolatng polynomal of values y. The polynomal nterpolaton becomes the man computatonal task n our proposed protocol. However, the modulus p n our polynomal nterpolaton s much smaller than the 14

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 modulus n most publc-key cryptosystems, such as RSA cryptosystem [13]. In addton, not lke conventonal user authentcaton protocol that authentcates one user at a tme, ths proposed authentcaton protocol authentcates all users at once. Thus, the proposed authentcaton protocol s very effcent n comparng wth all exstng authentcaton protocols. 6. CONCLUSIONS We propose a specal type of group authentcaton whch s specally desgned for group communcatons such as the ad hoc wreless communcaton network. The proposed group authentcaton protocol s no longer a one-to-one type of user authentcaton and t s a many-tomany type of authentcaton that authentcates multple users at once. We frst propose an basc one-tme group authentcaton protocol and then propose a general group authentcaton protocol wthout revealng tokens. Our proposed group authentcaton s very effcent snce the computaton s based on the computaton of lnear polynomal. ACKNOWLEDGEMENTS Ths research s supported by the Natonal Natural Scence Foundatons of Chna under Grant No. 61103247 and the Natural Scence Foundaton of Fuan Provnce under Grant No. 2011J05147. REFERENCES [1] Benaloh J. C., (1987) Secret sharng homomorphsms: keepng shares of a secret, n: Proceedngs of CRYPTO '86, LNCS 263, pp. 251-260. [2] Bruhadeshwar B. and Kulkarn S.S., (2011) Balancng revocaton and storage trade-offs n secure group communcaton, IEEE Transactons on Dependable and Secure Computng, 8 (1): 58-73. [3] Catur Bhakt M. A., Abdullah A., and Jung L. T., (2007) EAP-based authentcaton for ad hoc network, n: Proc. 2007 Semnar Nasonal Aplkas Teknolog Informas SNATI 07, pp. C-133-C- 137. [4] Caballero-Gl P. and Hernndez-Goya C., (2009) Self-organzed authentcaton n Moble ad-hoc networks, Journal of Communcatons and Networks, 11(5): 509-517. [5] Capkun S., Buttyn, L. and Hubaux J. P., (2003) Self-organzed publc-key management for moble ad hoc networks, IEEE Transactons on moble computng, 2(1):52-64. [6] Das M. L., (2009) Two-factor user authentcaton n wreless sensor networks, IEEE Transactons on Wreless Communcatons, 8 (3): 1086-1090. [7] Downnard I., (2002) Publc-key cryptography extensons nto Kerberos, IEEE Potentals, 21(5): 30-34. [8] Harn L. and Ln C., (2010) Strong verfable secret sharng scheme, Informaton Scences, 180(16): 3059-3064. [9] Ku W. C., (2005) Weaknesses and drawbacks of a password authentcaton scheme usng neural networks for multserver archtecture, IEEE Transactons on Neural Networks, 16(4), 1002-1005. [10] Opplger R., Hauser R., and Basn D., (2008) SSL/TLS sesson-aware user authentcaton, Computer, 41(3): 59-65. [11] Przada A. A. and McDonald C., (2004) Kerberos asssted authentcaton n moble ad-hoc networks, n: Proceedngs of the 27th Australasan Computer Scence Conference ACSC 04, 26(1), pp. 41-46. [12] Ren K., Yu S., Lou W., and Zhang Y., (2009) Mult-user broadcast authentcaton n wreless sensor networks, IEEE Transactons on Vehcular Technology, 58(8): 4554-4564. [13] Rvest R., Shamr A., and Adleman L., (1978) A method for obtanng dgtal sgnatures and publckey cryptosystems, Communcatons of the ACM, 21 (2): 120-126. [14] Sakarndr P. and Ansar N., (2010) Survey of securty servces on group communcatons, IET Informaton. Securty., 4(4): 258-272. [15] Shamr A., (1979) How to share a secret, Communcatons of the ACM, 22(11): 612-613. 15

Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 [16] Yan J., Blackwell A., Anderson R., and Grant A., (2004) Password memorablty and securty: Emprcal results, IEEE Securty & Prvacy Magazne, 2(5):25-31. Authors Len Harn receved the B.S. degree n electrcal engneerng from the Natonal Tawan Unversty n 1977, the M.S. degree n electrcal engneerng from the State Unversty of New York-Stony Brook n 1980, and the Ph.D. degree n electrcal engneerng from the Unversty of Mnnesota n 1984. In 1984, he oned the Department of Electrcal and Computer Engneerng, Unversty of Mssour- Columba as an assstant professor, and n 1986, he moved to Computer Scence and Telecommuncaton Program (CSTP), Unversty of Mssour, Kansas Cty (UMKC). Whle at UMKC, he went on development leave to work n Racal Data Group, Florda for a year. Hs research nterests nclude cryptography, network securty, and wreless communcaton securty. He has publshed a number of papers on dgtal sgnature desgn and applcatons and wreless and network securty. He has wrtten two books on securty. He s currently nvestgatng new ways of usng secret sharng n varous applcatons. Changlu Ln receved the BS degree and MS degree n mathematcs from the Fuan Normal Unversty, P.R. Chna, n 2002 and n 2005, respectvely, and receved the Ph.D degree n nformaton securty from the state key laboratory of nformaton securty, Graduate Unversty of Chnese Academy of Scences, P.R. Chna, n 2010. He works currently for the School of Mathematcs and Computer Scence, and the Key Laboratory of Network Securty and Cryptology, Fuan Normal Unversty. He s nterested n cryptography and network securty, and has conducted research n dverse areas, ncludng secret sharng, publc key cryptography and ther applcatons. 16