{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:58Z","timestamp":1772164138833,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The Internet of Things (IoT), serving as a principal technology enabling device interconnection, data amalgamation, and automation, boasts unrivaled ubiquity and convenience. Due to limited computing resources, small storage space, and restricted security features of IoT terminals, they are exposed to security risks such as information leakage, tampering, unauthorized access, and malicious control. To assure the security of data communication within the IoT framework necessitates the deployment of a Group Key Agreement (GKA), and the categorization of devices into specific groups. However, due to the dynamic structure of the IoT, which demands frequent device node addition and removal, might engender the constant need for group key updates. Traditional GKA lacks sufficient flexibility and response speed, resulting in additional computing and communication costs. Subsequently, group key updates could also pose a challenge to the forward and backward security provided by the GKA. In this work, we take a feasible step towards this challenge by proposing FADIC, a fine-grained attribute-based dynamic group key agreement scheme for IoT. We employ a server-assisted approach for the generation and administration of access trees, and achieve an efficient attribute-based dynamic group key agreement scheme devised by integrating Lagrange interpolation and attribute-based access tree structure. Our FADIC scheme ensures fine-grained access control and privacy protection for group members. Moreover, the server-assisted approach is utilized to compute the updated keys, resulting in a substantial reduction in communication and computational overheads associated with attribute-based group key agreement schemes. We formally prove that our FADIC is indistinguishable under chosen ciphertext attacks secure, supporting the desired forward and backward security. The comparison results unequivocally demonstrate that our FADIC outperforms its foremost counterparts.<\/jats:p>","DOI":"10.1186\/s42400-025-00394-1","type":"journal-article","created":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T01:00:56Z","timestamp":1765242056000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FADIC: a fine-grained attribute-based dynamic group key agreement scheme for IoT"],"prefix":"10.1186","volume":"8","author":[{"given":"ZhiYuan","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6184-4904","authenticated-orcid":false,"given":"MeiYing","family":"Jin","sequence":"additional","affiliation":[]},{"given":"JingWei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"HongPeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"394_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112859","volume":"309","author":"MB Begum","year":"2025","unstructured":"Begum MB, Nagarajan YAN, Rajalakshmi P (2025) Dynamic network security leveraging efficient covinet with granger causality-inspired graph neural networks for data compression in cloud iot devices. Knowl-Based Syst 309:112859","journal-title":"Knowl-Based Syst"},{"key":"394_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption, In: Proc. S &P, pp. 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"issue":"4","key":"394_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh D, Lynn B, Shacham H (2004) Short signatures from the Weil pairing. J Cryptol 17(4):297\u2013319","journal-title":"J Cryptol"},{"key":"394_CR4","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D (2002) Dynamic group diffie-hellman key exchange under standard assumptions, In Proc. EUROCRYPT, pp. 321\u2013336","DOI":"10.1007\/3-540-46035-7_21"},{"issue":"3","key":"394_CR5","doi-asserted-by":"publisher","first-page":"112","DOI":"10.3390\/info12030112","volume":"12","author":"Q Chen","year":"2021","unstructured":"Chen Q, Wu T, Hu C, Chen A, Zheng Q (2021) An identity-based cross-domain authenticated asymmetric group key agreement. Information 12(3):112","journal-title":"Information"},{"issue":"8","key":"394_CR6","doi-asserted-by":"publisher","first-page":"9046","DOI":"10.1007\/s11227-020-03561-y","volume":"77","author":"C Chen","year":"2021","unstructured":"Chen C, Deng X, Gan W, Chen J, Islam SH (2021) A secure blockchain-based group key agreement protocol for IoT. J. Supercomput. 77(8):9046\u20139068","journal-title":"J. Supercomput."},{"key":"394_CR7","doi-asserted-by":"crossref","unstructured":"Cheung L, Newport C (2007) Provably secure ciphertext policy ABE, In Proc. CCS, pp. 456\u2013465","DOI":"10.1145\/1315245.1315302"},{"issue":"5","key":"394_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4179","volume":"32","author":"Y Gan","year":"2021","unstructured":"Gan Y, Wang B, Zhuang Y, Gao Y, Li Z, Zhang Q (2021) An asymmetric group key agreement protocol based on attribute threshold for internet of things. Trans Emerg Telecommun Technol 32(5):e4179","journal-title":"Trans Emerg Telecommun Technol"},{"key":"394_CR9","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data, In Proc. CCS, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"394_CR10","unstructured":"Hatt T, Jarich P (2020) \u201cGlobal mobile trends 2021,\u201d . [Online]. Available: https:\/\/data.gsmaintelligence.com\/research\/research\/research-2020\/global-mobile-trends-2021"},{"key":"394_CR11","unstructured":"H\u00f6glund J (2023) \u201cPublic key infrastructure and its applications for resource-constrained IoT,\u201d Ph.D. dissertation, Uppsala University, Sweden"},{"key":"394_CR12","doi-asserted-by":"crossref","unstructured":"Jan SA, Ul Amin N, Shuja J, Abbas A, Maray M, Ali M (2022) SELWAK: a secure and efficient lightweight and anonymous authentication and key establishment scheme for IoT based vehicular Ad hoc networks,\u201d Sensors, vol.\u00a022(11)","DOI":"10.3390\/s22114019"},{"issue":"6","key":"394_CR13","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1093\/comjnl\/bxad016","volume":"66","author":"PN Kathavate","year":"2023","unstructured":"Kathavate PN (2023) Role of machine learning on key extraction for data privacy preservation of health care sectors in IoT environment. Comput J 66(6):1549\u20131562","journal-title":"Comput J"},{"key":"394_CR14","doi-asserted-by":"crossref","unstructured":"Kim H, Lee S, Lee D (2004) Constant-round authenticated group key exchange for dynamic groups, In: Proc. ASIACRYPT, pp. 245\u2013259","DOI":"10.1007\/978-3-540-30539-2_18"},{"issue":"6","key":"394_CR15","doi-asserted-by":"publisher","first-page":"5155","DOI":"10.1109\/JIOT.2018.2840321","volume":"5","author":"Y Kung","year":"2018","unstructured":"Kung Y, Hsiao H (2018) GroupIt: lightweight group key management for dynamic IoT environments. IEEE Internet Things J 5(6):5155\u20135165","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"394_CR16","doi-asserted-by":"publisher","first-page":"3534","DOI":"10.3390\/s18103534","volume":"18","author":"D Lee","year":"2018","unstructured":"Lee D, Lee I (2018) Dynamic group authentication and key exchange scheme based on threshold secret sharing for IoT smart metering environments. Sensors 18(10):3534","journal-title":"Sensors"},{"issue":"16","key":"394_CR17","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/JIOT.2022.3149117","volume":"9","author":"T-F Lee","year":"2022","unstructured":"Lee T-F, Ye X, Lin S-H (2022) Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things. IEEE Internet Things J 9(16):336\u2013348","journal-title":"IEEE Internet Things J"},{"key":"394_CR18","doi-asserted-by":"crossref","unstructured":"Lee S, Kim Y, Kim K, Ryu D-H (2003) An efficient tree-based group key agreement using bilinear map,\u2019 In: Proc. ANCS, pp. 357\u2013371","DOI":"10.1007\/978-3-540-45203-4_28"},{"key":"394_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.ins.2017.06.003","volume":"414","author":"J Li","year":"2017","unstructured":"Li J, Zhang L (2017) Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol. Inf Sci 414:187\u2013202","journal-title":"Inf Sci"},{"issue":"11","key":"394_CR20","doi-asserted-by":"publisher","first-page":"8326","DOI":"10.1109\/TII.2022.3176048","volume":"18","author":"J Li","year":"2022","unstructured":"Li J, Qiao Z, Peng J (2022) Asymmetric group key agreement protocol based on blockchain and attribute for industrial internet of things. IEEE Trans Ind Inf 18(11):8326\u20138335","journal-title":"IEEE Trans Ind Inf"},{"issue":"11","key":"394_CR21","doi-asserted-by":"publisher","first-page":"8326","DOI":"10.1109\/TII.2022.3176048","volume":"18","author":"J Li","year":"2022","unstructured":"Li J, Qiao Z, Peng J (2022) Asymmetric group key agreement protocol based on blockchain and attribute for industrial internet of things. IEEE Trans Ind Inf 18(11):8326\u20138335","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"394_CR22","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","volume":"9","author":"M Masud","year":"2022","unstructured":"Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2022) Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare. IEEE Internet Things J 9(4):2649\u20132656","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"394_CR23","first-page":"582","volume":"21","author":"S Nathani","year":"2019","unstructured":"Nathani S, Tripathi B, Khatoon S (2019) A dynamic ID based authenticated group key agreement protocol from pairing. Int. J. Netw. Secur. 21(4):582\u2013591","journal-title":"Int. J. Netw. Secur."},{"key":"394_CR24","first-page":"457","volume":"3494","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B (2005) Fuzzy identity based encryption. Proc. EUROCRYPT 3494:457\u2013473","journal-title":"Proc. EUROCRYPT"},{"key":"394_CR25","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs, IACR Cryptol. ePrint Arch."},{"key":"394_CR26","volume":"309","author":"KK Singamaneni","year":"2024","unstructured":"Singamaneni KK, Budati AK, Bikku T (2024) An efficient q-kpabe framework to enhance cloud-based IoT security and privacy. Wirel Pers Commun 309:112859","journal-title":"Wirel Pers Commun"},{"key":"394_CR27","doi-asserted-by":"crossref","unstructured":"Wu Q, Yi M, Susilo W, Bo Q, Domingo-Ferrer J (2009) Asymmetric group key agreement, In: Proc. EUROCRYPT, pp. 153\u2013170","DOI":"10.1007\/978-3-642-01001-9_9"},{"issue":"7","key":"394_CR28","doi-asserted-by":"publisher","first-page":"590","DOI":"10.3390\/e26070590","volume":"26","author":"S Xu","year":"2024","unstructured":"Xu S, Liu R (2024) A conditional privacy-preserving identity-authentication scheme for federated learning in the internet of vehicles. Entropy 26(7):590","journal-title":"Entropy"},{"issue":"17","key":"394_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20174835","volume":"20","author":"Z Xu","year":"2020","unstructured":"Xu Z, Li F, Deng H, Tan M, Zhang J, Xu J (2020) A blockchain-based authentication and dynamic group key agreement protocol. Sensors 20(17):1\u201319","journal-title":"Sensors"},{"key":"394_CR30","doi-asserted-by":"crossref","unstructured":"Xu Z, Li F, Deng H, Tan M, Zhang J, Xu J (2020) A blockchain-based authentication and dynamic group key agreement protocol, Sensors, vol.\u00a020, no.\u00a017, [Online]. Available: https:\/\/www.mdpi.com\/1424-8220\/20\/17\/4835","DOI":"10.3390\/s20174835"},{"key":"394_CR31","doi-asserted-by":"crossref","unstructured":"Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities, In: Proc. ICCAD, 417\u2013423","DOI":"10.1109\/ICCAD.2014.7001385"},{"key":"394_CR32","doi-asserted-by":"crossref","unstructured":"Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities, In: Proc. ICCAD, pp. 417\u2013423","DOI":"10.1109\/ICCAD.2014.7001385"},{"issue":"11","key":"394_CR33","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1109\/TIFS.2015.2447933","volume":"10","author":"L Zhang","year":"2015","unstructured":"Zhang L, Wu Q, Domingo-Ferrer J, Qin B, Dong Z (2015) Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications. IEEE Trans Inf Forensics Secur 10(11):2352\u20132364","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"394_CR34","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10207-016-0339-8","volume":"16","author":"L Zhang","year":"2017","unstructured":"Zhang L, Wu Q, Qin B, Deng H, Li J, Liu J, Shi W (2017) Certificateless and identity-based authenticated asymmetric group key agreement. Int J Inf Sec 16(5):559\u2013576","journal-title":"Int J Inf Sec"},{"key":"394_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.08.013","volume":"123","author":"Q Zhang","year":"2018","unstructured":"Zhang Q, Gan Y, Liu L, Wang X, Luo X, Li Y (2018) An authenticated asymmetric group key agreement based on attribute encryption. J Netw Comput Appl 123:1\u201310","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"394_CR36","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TDSC.2021.3138445","volume":"20","author":"R Zhang","year":"2023","unstructured":"Zhang R, Zhang L, Choo K-KR, Chen T (2023) Dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy for group-oriented applications. IEEE Trans Dependable Secure Comput 20(1):492\u2013505","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"394_CR37","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1109\/TDSC.2021.3138445","volume":"20","author":"R Zhang","year":"2023","unstructured":"Zhang R, Zhang L, Choo KR, Chen T (2023) Dynamic authenticated asymmetric group key agreement with sender non-repudiation and privacy for group-oriented applications. IEEE Trans Dependable Secur Comput 20(1):492\u2013505","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"5","key":"394_CR38","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.adhoc.2010.11.002","volume":"9","author":"X Zhao","year":"2011","unstructured":"Zhao X, Zhang F, Tian H (2011) Dynamic asymmetric group key agreement for Ad Hoc networks. Ad Hoc Netw 9(5):928\u2013939","journal-title":"Ad Hoc Netw"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00394-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00394-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00394-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T01:00:59Z","timestamp":1765242059000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00394-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["394"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00394-1","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,9]]},"assertion":[{"value":"7 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interestss"}}],"article-number":"91"}}