Abstract
Group Authentication Schemes (GAS) are methodologies developed to verify the membership of multiple users simultaneously. Numerous GAS methods have been explored in the literature and can be classified into three generations based on their underlying mathematical principles. First-generation GASs rely on polynomial interpolation and the multiplicative subgroup of a finite field. Second-generation GASs also employ polynomial interpolation but distinguish themselves by using elliptic curves over finite fields. While third-generation GASs offer a promising solution for scalable environments, they have limitations in certain applications. Such applications typically require identifying users participating in the authentication process. In the third-generation GAS, users can verify their credentials while remaining anonymous. However, user identification is necessary in various applications. In this study, we propose an improved version of third-generation GAS that uses inner product spaces and polynomial interpolation to resolve this limitation. We address the issue of preventing malicious actions by legitimate group members. The current third-generation scheme allows members to share group credentials, which can jeopardize group confidentiality. Our proposed scheme mitigates this risk by preventing individual users from distributing valid credentials. However, a potential limitation of our scheme is its reliance on a central authority for authentication in certain scenarios.
Data availability
All data generated or analysed during this study are included in this published article.
References
Da Xu, L., He, W. & Li, S. Internet of Things in Industries: A survey. IEEE Trans. Ind. Inform. 10, 2233–2243 (2014).
Frustaci, M., Pace, P., Aloi, G. & Fortino, G. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet Things J. 5, 2483–2495 (2017).
Chaudhary, R., Aujla, G. S., Kumar, N. & Zeadally, S. Lattice-based public key cryptosystem for Internet of things environment: Challenges and solutions. IEEE Internet Things J. 6, 4897–4909 (2018).
Chettri, L. & Bera, R. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things J. 7, 16–32 (2019).
Nguyen, D. C. et al. 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal 9, 359–383 (2021).
Aman, M. N., Javaid, U. & Sikdar, B. A privacy-preserving and scalable authentication protocol for the Internet of vehicles. IEEE Internet Things J. 8, 1123–1139 (2020).
Guzey, S., Karabulut Kurt, G. & Ozdemir, E. Group authentication and key establishment scheme. IEEE Internet Things J. 11, 35086–35099 (2024).
Gharavi, H., Granjal, J. & Monteiro, E. Post-quantum blockchain security for the Internet of Things: Survey and research directions. IEEE Commun. Surv. Tutor. 26, 1748–1774 (2024).
Shamir, A. How to share a secret. Commun. ACM 22, 612–613 (1979).
Blakley, G. R. Safeguarding cryptographic keys. In International Workshop on Managing Requirements Knowledge (MARK), 313–318 (1979).
Alfred, M., Scott, V. et al. Handbook of Applied Cryptography (CRC Press, 1997).
Chaum, D. & Van Heyst, E. Group signatures. In Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques, 257–265 (1991).
Harn, L. Group authentication. IEEE Trans. Comput. 62, 1893–1898 (2012).
Li, J., Wen, M. & Zhang, T. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J. 3, 408–417 (2015).
Mahalle, P. N., Prasad, N. R. & Prasad, R. Threshold cryptography-based group authentication (TCGA) scheme for the Internet of things (IoT). In International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 1–5 (2014).
Gope, P., Das, A. K., Kumar, N. & Cheng, Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 15, 4957–4968 (2019).
Ren, X., Cao, J., Ma, M., Li, H. & Zhang, Y. A novel PUF-based group authentication and data transmission scheme for NB-IoT in 3GPP 5G networks. IEEE Internet Things J. 9, 3642–3656 (2021).
Singh, K. R. & Sethia, D. ALPAK: Anonymized Lightweight PUF-based group Authentication with Key distribution for IoT Devices. In International Conference on Computing Communication and Networking Technologies (ICCCNT), 1–7 (2023).
Nakkar, M., AlTawy, R. & Youssef, A. Lightweight group authentication scheme leveraging Shamir’s secret sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 11, 3412–3429 (2024).
Zhao, S. et al. PPMM-DA: Privacy-preserving multidimensional and multisubset data aggregation with differential privacy for fog-based smart grids. IEEE Internet of Things Journal 11, 6096–6110 (2023).
Zhang, C., Lu, R., Lin, X., Ho, P.-H. & Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM, 246–250 (2008).
Zhang, S. & Lee, J.-H. A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7, 4557–4565 (2019).
Xu, P. et al. Anti-quantum certificateless group authentication for massive accessing IoT devices. IEEE Internet Things J. 11, 16561–16577 (2024).
Aydin, Y., Karabulut Kurt, G., Ozdemir, E. & Yanikomeroglu, H. A flexible and lightweight group authentication scheme. IEEE Internet Things J. 7, 10277–10287 (2020).
Hoffmann, W. Iterative algorithms for Gram-Schmidt orthogonalization. Computing 41, 335–348 (1989).
Douceur, J. R. The sybil attack. In International Workshop on Peer-to-Peer Systems, 251–260 (2002).
Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C. Composability of bellare-rogaway key exchange protocols. In Proceedings of the 18th ACM conference on Computer and communications security, 51–62 (2011).
Semal, B., Markantonakis, K. & Akram, R. N. A certificateless group authenticated key agreement protocol for secure communication in untrusted uav networks. In 2018 IEEE/AIAA 37th digital avionics systems conference (DASC), 1–8 (IEEE, 2018).
Zhang, J., Cui, J., Zhong, H., Chen, Z. & Liu, L. Pa-crt: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secur. Comput. 18, 722–735 (2019).
Funding
This work was supported in part by Istanbul Technical University Scientific Research Projects (ITU-BAP) under the Graduate Thesis Project – Doctoral Thesis Project (Project No: MDK-2025-47377), in part by the Tier 1 Canada Research Chair Program, and in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant Program.
Author information
Authors and Affiliations
Contributions
The theoretical layout was developed by E.O. and O.G. The implementation and analysis were conducted by O.G. and G.K-K, while the security analysis was handled by E.O. and O.G.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary Information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Gerenli, O., Karabulut-Kurt, G. & Ozdemir, E. A user centric group authentication scheme for secure communication. Sci Rep (2026). https://doi.org/10.1038/s41598-026-41463-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-026-41463-w