Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A user centric group authentication scheme for secure communication
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 03 April 2026

A user centric group authentication scheme for secure communication

  • Oylum Gerenli1,
  • Gunes Karabulut-Kurt2 &
  • Enver Ozdemir1 

Scientific Reports , Article number:  (2026) Cite this article

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Computer science
  • Electrical and electronic engineering

Abstract

Group Authentication Schemes (GAS) are methodologies developed to verify the membership of multiple users simultaneously. Numerous GAS methods have been explored in the literature and can be classified into three generations based on their underlying mathematical principles. First-generation GASs rely on polynomial interpolation and the multiplicative subgroup of a finite field. Second-generation GASs also employ polynomial interpolation but distinguish themselves by using elliptic curves over finite fields. While third-generation GASs offer a promising solution for scalable environments, they have limitations in certain applications. Such applications typically require identifying users participating in the authentication process. In the third-generation GAS, users can verify their credentials while remaining anonymous. However, user identification is necessary in various applications. In this study, we propose an improved version of third-generation GAS that uses inner product spaces and polynomial interpolation to resolve this limitation. We address the issue of preventing malicious actions by legitimate group members. The current third-generation scheme allows members to share group credentials, which can jeopardize group confidentiality. Our proposed scheme mitigates this risk by preventing individual users from distributing valid credentials. However, a potential limitation of our scheme is its reliance on a central authority for authentication in certain scenarios.

Data availability

All data generated or analysed during this study are included in this published article.

References

  1. Da Xu, L., He, W. & Li, S. Internet of Things in Industries: A survey. IEEE Trans. Ind. Inform. 10, 2233–2243 (2014).

    Google Scholar 

  2. Frustaci, M., Pace, P., Aloi, G. & Fortino, G. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet Things J. 5, 2483–2495 (2017).

    Google Scholar 

  3. Chaudhary, R., Aujla, G. S., Kumar, N. & Zeadally, S. Lattice-based public key cryptosystem for Internet of things environment: Challenges and solutions. IEEE Internet Things J. 6, 4897–4909 (2018).

    Google Scholar 

  4. Chettri, L. & Bera, R. A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet Things J. 7, 16–32 (2019).

    Google Scholar 

  5. Nguyen, D. C. et al. 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal 9, 359–383 (2021).

    Google Scholar 

  6. Aman, M. N., Javaid, U. & Sikdar, B. A privacy-preserving and scalable authentication protocol for the Internet of vehicles. IEEE Internet Things J. 8, 1123–1139 (2020).

    Google Scholar 

  7. Guzey, S., Karabulut Kurt, G. & Ozdemir, E. Group authentication and key establishment scheme. IEEE Internet Things J. 11, 35086–35099 (2024).

    Google Scholar 

  8. Gharavi, H., Granjal, J. & Monteiro, E. Post-quantum blockchain security for the Internet of Things: Survey and research directions. IEEE Commun. Surv. Tutor. 26, 1748–1774 (2024).

    Google Scholar 

  9. Shamir, A. How to share a secret. Commun. ACM 22, 612–613 (1979).

    Google Scholar 

  10. Blakley, G. R. Safeguarding cryptographic keys. In International Workshop on Managing Requirements Knowledge (MARK), 313–318 (1979).

  11. Alfred, M., Scott, V. et al. Handbook of Applied Cryptography (CRC Press, 1997).

  12. Chaum, D. & Van Heyst, E. Group signatures. In Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques, 257–265 (1991).

  13. Harn, L. Group authentication. IEEE Trans. Comput. 62, 1893–1898 (2012).

    Google Scholar 

  14. Li, J., Wen, M. & Zhang, T. Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J. 3, 408–417 (2015).

    Google Scholar 

  15. Mahalle, P. N., Prasad, N. R. & Prasad, R. Threshold cryptography-based group authentication (TCGA) scheme for the Internet of things (IoT). In International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 1–5 (2014).

  16. Gope, P., Das, A. K., Kumar, N. & Cheng, Y. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 15, 4957–4968 (2019).

    Google Scholar 

  17. Ren, X., Cao, J., Ma, M., Li, H. & Zhang, Y. A novel PUF-based group authentication and data transmission scheme for NB-IoT in 3GPP 5G networks. IEEE Internet Things J. 9, 3642–3656 (2021).

    Google Scholar 

  18. Singh, K. R. & Sethia, D. ALPAK: Anonymized Lightweight PUF-based group Authentication with Key distribution for IoT Devices. In International Conference on Computing Communication and Networking Technologies (ICCCNT), 1–7 (2023).

  19. Nakkar, M., AlTawy, R. & Youssef, A. Lightweight group authentication scheme leveraging Shamir’s secret sharing and PUFs. IEEE Trans. Netw. Sci. Eng. 11, 3412–3429 (2024).

    Google Scholar 

  20. Zhao, S. et al. PPMM-DA: Privacy-preserving multidimensional and multisubset data aggregation with differential privacy for fog-based smart grids. IEEE Internet of Things Journal 11, 6096–6110 (2023).

    Google Scholar 

  21. Zhang, C., Lu, R., Lin, X., Ho, P.-H. & Shen, X. An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM, 246–250 (2008).

  22. Zhang, S. & Lee, J.-H. A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7, 4557–4565 (2019).

    Google Scholar 

  23. Xu, P. et al. Anti-quantum certificateless group authentication for massive accessing IoT devices. IEEE Internet Things J. 11, 16561–16577 (2024).

    Google Scholar 

  24. Aydin, Y., Karabulut Kurt, G., Ozdemir, E. & Yanikomeroglu, H. A flexible and lightweight group authentication scheme. IEEE Internet Things J. 7, 10277–10287 (2020).

    Google Scholar 

  25. Hoffmann, W. Iterative algorithms for Gram-Schmidt orthogonalization. Computing 41, 335–348 (1989).

    Google Scholar 

  26. Douceur, J. R. The sybil attack. In International Workshop on Peer-to-Peer Systems, 251–260 (2002).

  27. Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C. Composability of bellare-rogaway key exchange protocols. In Proceedings of the 18th ACM conference on Computer and communications security, 51–62 (2011).

  28. Semal, B., Markantonakis, K. & Akram, R. N. A certificateless group authenticated key agreement protocol for secure communication in untrusted uav networks. In 2018 IEEE/AIAA 37th digital avionics systems conference (DASC), 1–8 (IEEE, 2018).

  29. Zhang, J., Cui, J., Zhong, H., Chen, Z. & Liu, L. Pa-crt: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks. IEEE Trans. Dependable Secur. Comput. 18, 722–735 (2019).

    Google Scholar 

Download references

Funding

This work was supported in part by Istanbul Technical University Scientific Research Projects (ITU-BAP) under the Graduate Thesis Project – Doctoral Thesis Project (Project No: MDK-2025-47377), in part by the Tier 1 Canada Research Chair Program, and in part by the Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant Program.

Author information

Authors and Affiliations

  1. Istanbul Technical University, Informatics Institute, Istanbul, Turkey

    Oylum Gerenli & Enver Ozdemir

  2. Polytechnique Montréal, Department of Electrical Engineering, Montréal, Canada

    Gunes Karabulut-Kurt

Authors
  1. Oylum Gerenli
    View author publications

    Search author on:PubMed Google Scholar

  2. Gunes Karabulut-Kurt
    View author publications

    Search author on:PubMed Google Scholar

  3. Enver Ozdemir
    View author publications

    Search author on:PubMed Google Scholar

Contributions

The theoretical layout was developed by E.O. and O.G. The implementation and analysis were conducted by O.G. and G.K-K, while the security analysis was handled by E.O. and O.G.

Corresponding author

Correspondence to Oylum Gerenli.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Supplementary Information. (download PDF )

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gerenli, O., Karabulut-Kurt, G. & Ozdemir, E. A user centric group authentication scheme for secure communication. Sci Rep (2026). https://doi.org/10.1038/s41598-026-41463-w

Download citation

  • Received: 04 April 2025

  • Accepted: 20 February 2026

  • Published: 03 April 2026

  • DOI: https://doi.org/10.1038/s41598-026-41463-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics