Skip to main content
Log in

Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The specifics of secure interaction in large-scale industrial systems is investigated, the requirements for group authentication schemes are determined allowing for the specifics. The analysis of approaches to the organization of secure interaction between system nodes based on the group authentication is carried out. The prospects for the application of group authentication in large-scale industrial systems are considered.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Kisner, R.A., et al., Cybersecurity through Real-Time Distributed Control Systems, Oak Ridge National Laboratory, Technical Report ORNL/TM-2010/30, 2010.

  2. Chaum, D. and van Heyst, E., Group signatures, Advances in Cryptology—EUROCRYPT’91, Berlin, Heidelberg: Springer, 1991; Lect. Notes Comput. Sci., 1991, vol. 547, pp. 257–265.

    MATH  Google Scholar 

  3. Rivest, R.L., Shamir, A., and Tauman, Y., How to leak a secret, Advances in Cryptology—ASIACRYPT 2001, Berlin–Heidelberg: Springer, 2001; Lect. Notes Comput. Sci., 2001, vol. 2248, pp. 552–565.

    MATH  Google Scholar 

  4. Desmedt, Y., Society and group oriented cryptography: A new concept, Advances in Cryptology—CRYPTO’87, Berlin–Heidelberg: Springer, 1987; Lect. Notes Comput. Sci., 1987, vol. 293, pp. 120–127.

    Google Scholar 

  5. Itakura, K., A public-key cryptosystem suitable for digital multisignatures, NEC Res. Dev., 1983, vol. 71, pp. 1–8.

    Google Scholar 

  6. Boldyreva, A., et al., Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 276–285.

Download references

Funding

The reported study was funded by RFBR according to the research project no. 18-29-03102.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. B. Aleksandrova.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Kolemesin

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aleksandrova, E.B., Yarmak, A.V. & Kalinin, M.O. Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems. Aut. Control Comp. Sci. 53, 879–882 (2019). https://doi.org/10.3103/S0146411619080029

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619080029

Keywords:

Navigation