Dynamic Group Time-Based One-Time Passwords

被引:1
|
作者
Cao, Xuelian [1 ]
Yang, Zheng [1 ]
Ning, Jianting [2 ,3 ]
Jin, Chenglu [4 ]
Lu, Rongxing [5 ]
Liu, Zhiming [1 ]
Zhou, Jianying [6 ]
机构
[1] Southwest Univ, Sch Software, Comp & Informat Sci, Chongqing 400715, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Key Lab Analyt Math & Applicat, Minist Educ, Fuzhou 350117, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[4] Ctr Wiskunde & Informat, NL-1098 XG Amsterdam, Netherlands
[5] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
[6] Singapore Univ Technol & Design, iTrust, Singapore 487372, Singapore
关键词
Group time-based one-time passwords; dynamic group management; anonymity; traceability; authentication; security model; GROUP SIGNATURES; FOUNDATIONS;
D O I
10.1109/TIFS.2024.3386350
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic primitive for achieving anonymous client authentication, which enables the efficient generation of time-based one-time passwords on behalf of a group without revealing any information about the actual client's identity beyond their group membership. The security properties of GTOTP regarding anonymity and traceability have been formulated in a static group management setting (where all group members should be determined during the group initialization phase), yet, a formal treatment for real-world dynamic groups (i.e., group members may join and leave at any time) is still an open question. It is non-trivial to construct an efficient GTOTP scheme that can provide a lightweight password generation procedure run by group members and support dynamic group management, allowing group members to join and leave without affecting other members' states (non-disruptively). To address the above challenge, we first define the notion and the security model of dynamic group time-based one-time passwords (DGTOTP) in this work. We then present an efficient DGTOTP construction that can generically transform an asymmetric time-based one-time passwords scheme into a DGTOTP scheme utilizing a chameleon hash function family and a Merkle tree scheme. Within our construction, we particularly tailor an outsourcing solution realizing an issue-first-and-join-later (IFJL) strategy, enabling smooth joining and revocation without disrupting other group members. Moreover, our scheme minimizes symmetric cryptographic operations and maintains constant storage for group members, compared to the linear storage cost that grows rapidly with respect to the lifetime of the GTOTP instance in the previous static GTOTP scheme. Our DGTOTP scheme satisfies stronger security guarantees in a dynamic group management setting without random oracles. Our experimental results confirm the efficiency of our DGTOTP scheme.
引用
收藏
页码:4897 / 4913
页数:17
相关论文
共 50 条
  • [1] Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location
    Yang, Zheng
    Jin, Chenglu
    Ning, Jianting
    Li, Zengpeng
    Tien Tuan Anh Dinh
    Zhou, Jianying
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 497 - 512
  • [2] Authentication Protocols Based on One-Time Passwords
    Babkin, Sergey
    Epishkina, Anna
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1794 - 1798
  • [3] Independent one-time passwords
    Rubin, AD
    COMPUTING SYSTEMS, 1996, 9 (01): : 15 - 27
  • [4] Response: Independent one-time passwords
    Rubin, AD
    COMPUTING SYSTEMS, 1996, 9 (03): : 257 - 257
  • [5] Covert Channels in One-Time Passwords Based on Hash Chains
    Keller, Jorg
    Wendzel, Steffen
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [6] One-Time Passwords: Resistance to Masquerade Attack
    Babkin, Sergey
    Epishkina, Anna
    POSTPROCEEDINGS OF THE 9TH ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA 2018), 2018, 145 : 199 - 203
  • [7] Controversy rejoinder: Independent one-time passwords
    Adams, J
    COMPUTING SYSTEMS, 1996, 9 (03): : 255 - 256
  • [8] Demo: Human-Computable One-Time Passwords
    Matelski, Slawomir
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 289 - 290
  • [9] Time-based One-Time Password for Wi-Fi Authentication and Security
    Sudar, Chandramohan
    Arjun, S. K.
    Deepthi, L. R.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1212 - 1215
  • [10] Using one-time passwords to prevent password phishing attacks
    Huang, Chun-Ying
    Ma, Shang-Pin
    Chen, Kuan-Ta
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1292 - 1301