{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:18:19Z","timestamp":1767705499121,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"S4","license":[{"start":{"date-parts":[[2018,2,10]],"date-time":"2018-02-10T00:00:00Z","timestamp":1518220800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571360","61602374"],"award-info":[{"award-number":["61571360","61602374"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602376","61702411"],"award-info":[{"award-number":["61602376","61702411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s10586-018-1929-1","type":"journal-article","created":{"date-parts":[[2018,2,10]],"date-time":"2018-02-10T02:19:09Z","timestamp":1518229149000},"page":"8605-8611","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient group authentication in RFID using secret sharing scheme"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2507-5143","authenticated-orcid":false,"given":"Yanxiao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Qindong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yichuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wenjiang","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,10]]},"reference":[{"issue":"3","key":"1929_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MPRV.2007.64","volume":"6","author":"F Michahelles","year":"2007","unstructured":"Michahelles, F., Thiesse, F., Schmidt, A., Williams, J.R.: Pervasive RFID and near field communication technology. IEEE Pervasive Comput. 6(3), 94\u201396 (2007)","journal-title":"IEEE Pervasive Comput."},{"issue":"4","key":"1929_CR2","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"HY Chien","year":"2007","unstructured":"Chien, H.Y.: SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans. Dependable Secur. Comput. 4(4), 337\u2013340 (2007)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"1929_CR3","doi-asserted-by":"crossref","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing time complexity in RFID systems. International Conference on Selected Areas in Cryptography, LNCS 3897, 291\u2013306 (2005)","DOI":"10.1007\/11693383_20"},{"key":"1929_CR4","doi-asserted-by":"crossref","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: CRYPTO2005, LNCS, vol. 3126, pp. 293\u2013308. (2005)","DOI":"10.1007\/11535218_18"},{"issue":"7","key":"1929_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.4304\/jcm.3.7.20-27","volume":"3","author":"T Cao","year":"2008","unstructured":"Cao, T., Shen, P.: Cryptanalysis of some RFID authentication protocols. J. Commun. 3(7), 95\u2013100 (2008)","journal-title":"J. Commun."},{"key":"1929_CR6","doi-asserted-by":"crossref","unstructured":"Juels, A.: Strengthening EPC tag against cloning. In: Acm Workshop on Wireless Security, pp. 67\u201376. (2005)","DOI":"10.1145\/1080793.1080805"},{"key":"1929_CR7","unstructured":"Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Ecrypt Workshop on RFID and Lightweight Crypto. (2005)"},{"issue":"5","key":"1929_CR8","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1049\/iet-ifs.2016.0103","volume":"11","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Zhong, Q., Chang, L., Xia, Z., He, D., Cheng, C.: A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5), 250\u2013255 (2017)","journal-title":"IET Inf. Secur."},{"issue":"3","key":"1929_CR9","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.comcom.2010.05.011","volume":"34","author":"TC Yeh","year":"2011","unstructured":"Yeh, T.C., Wua, C.H., Tseng, Y.M.: Improvement of the RFID authentication scheme based on quadratic residues. Comput. Commun. 34(3), 337\u2013341 (2011)","journal-title":"Comput. Commun."},{"key":"1929_CR10","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A. LMAP: a real lightweight mutual authentication protocol for low-cost RFID tags. In: Workshop on RFID Security, p. 6. (2006)","DOI":"10.1007\/11833529_93"},{"issue":"3","key":"1929_CR11","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1109\/JSEN.2015.2489258","volume":"16","author":"YN Liu","year":"2016","unstructured":"Liu, Y.N., Cheng, C., Gu, T., Jiang, T., Li, X.: A lightweight authenticated communication scheme for smart grid. IEEE Sens. J. 16(3), 836\u2013842 (2016)","journal-title":"IEEE Sens. J."},{"key":"1929_CR12","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.H.: Vulnerability analysis of EMAP An efficient RFID mutual authentication protocol. In: International Conference on Availability, Reliability and Security, pp. 238\u2013245. (2007)","DOI":"10.1109\/ARES.2007.159"},{"key":"1929_CR13","doi-asserted-by":"crossref","unstructured":"Karthikeyan, S., Nesterenko, M.: RFID security without extensive cryptography. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63\u201367. (2005)","DOI":"10.1145\/1102219.1102229"},{"key":"1929_CR14","unstructured":"Molnar, D., Wagner, D.: Privacy and security in library RFID: Issues, practices, and architectures. In: ACM Conference on Computer & Communications Security, pp. 210-219, (2004)"},{"issue":"12","key":"1929_CR15","doi-asserted-by":"publisher","first-page":"2373","DOI":"10.1016\/j.comnet.2008.04.016","volume":"52","author":"Y Chen","year":"2008","unstructured":"Chen, Y., Chou, J.S., Sun, H.M.: A novel mutual authentication scheme based on quadratic residues. Comput. Netw. 52(12), 2373\u20132380 (2008)","journal-title":"Comput. Netw."},{"issue":"14","key":"1929_CR16","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1016\/j.comnet.2013.06.005","volume":"57","author":"HY Chien","year":"2013","unstructured":"Chien, H.Y.: Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. Comput. Netw. 57(14), 2705\u20132717 (2013)","journal-title":"Comput. Netw."},{"key":"1929_CR17","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1016\/j.jpdc.2009.07.007","volume":"69","author":"HY Chien","year":"2009","unstructured":"Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distrib. Comput. 69, 848\u2013853 (2009)","journal-title":"J. Parallel Distrib. Comput."},{"key":"1929_CR18","doi-asserted-by":"crossref","unstructured":"Godor, G., Imre, S.: Elliptic curve cryptography based authentication protocol for low-cost RFID tags. In: IEEE International Conference on Rfid-technologies & Applications, pp. 386-393, (2011)","DOI":"10.1109\/RFID-TA.2011.6068667"},{"issue":"7","key":"1929_CR19","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"YP Liao","year":"2014","unstructured":"Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18(7), 133\u2013146 (2014)","journal-title":"Ad Hoc Netw."},{"key":"1929_CR20","unstructured":"Chien, H.: Y., Elliptic curve cryptography-based RFID authentication resisting active tracking. Wirel. Person. Commun. 94, 2925\u20132936 (2017)"},{"issue":"11","key":"1929_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM. 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM."},{"key":"1929_CR22","doi-asserted-by":"crossref","unstructured":"Obana, S.: Almost optimum $$t$$ t -cheater identifiable secret sharing schemes. In: EUROCRYPT2011, LNCS, vol. 6632, pp. 284\u2013302. (2011)","DOI":"10.1007\/978-3-642-20465-4_17"},{"issue":"1","key":"1929_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1049\/iet-ifs.2012.0322","volume":"8","author":"YX Liu","year":"2014","unstructured":"Liu, Y.X.: Efficient $$t$$ t -cheater identifiable $$(k, n)$$ ( k , n ) secret sharing scheme for $$t\\le \\lfloor \\frac{k-2}{2}\\rfloor $$ t \u2264 \u230a k - 2 2 \u230b . IET Inf. Secur. 8(1), 37\u201341 (2014)","journal-title":"IET Inf. Secur."},{"key":"1929_CR24","first-page":"112","volume":"234","author":"AJ Menezes","year":"1999","unstructured":"Menezes, A.J.: Elliptic curve public key cryptosystems. J. Xian Min. Inst. 234, 112\u2013131 (1999)","journal-title":"J. Xian Min. Inst."},{"issue":"3","key":"1929_CR25","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BF02252871","volume":"1","author":"M Tompa","year":"1989","unstructured":"Tompa, M., Woll, H.: How to share a secret with cheaters. J. Cryptol. 1(3), 133\u2013138 (1989)","journal-title":"J. Cryptol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-1929-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1929-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1929-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T04:37:22Z","timestamp":1660451842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-1929-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,10]]},"references-count":25,"journal-issue":{"issue":"S4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1929"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-1929-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,2,10]]},"assertion":[{"value":"6 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}