期刊文献+

基于角色访问控制的无可信第三方可扩展匿名性控制

Scalable Anonymous Scheme with Role-Based Access Control without TTP
下载PDF
导出
摘要 本文对可扩展匿名性的网络支付协议进行了分析,并分析了它的基于角色的访问控制(RBAC)。协议用电子现金支付交易。这是一个离线的支付协议,它可以阻止用户不止一次花费同一电子现金。如果用户担心他们的身份泄露给银行,可以改进匿名性。方案中银行只在需要跟踪时要求用户解密消息,从而进行用户和钱币的跟踪,这样跟踪时用户是知道的,因此简便实用地解决了无可信第三方情况下电子现金匿名性控制问题. This paper analyzes a payment protocol with scalable anonymity for Intemet purchases, and analyzes its role-based access control (RBAC). The protocol uses electronic cash for payment transactions. It is an offline payment scheme that can prevent a consumer from spending a coin more than once. Consumers can improve anonymity if they are worried about disclosure of their identities to banks In this scheme the bank demands uses to decrypt the mark of the coin when tracing is needed so that the user and coin can he linked together and then user is certain about tracing.So the scheme resolves the problem of the E-cash anonymity control without TTP simply and practically.
出处 《微计算机信息》 北大核心 2006年第07X期153-155,125,共4页 Control & Automation
基金 河北省自然科学基金资助项目编号:F2005000368
关键词 基与角色控制访问 电子现金 匿名性控制 限制性盲签名 Role-Based Access Control,Electronic-cash,anonymity control,restrictive blind signature
  • 相关文献

参考文献7

  • 1D.Chaum,"Blind Signature for Untraceable Payments," Proc.Advances in Cryptology-Crypto ' 82, pp. 199-203, 1983.
  • 2伏汉英,陈海勇,黄永忠.基于SDSI规范的角色信任传递模型[J].微计算机信息,2005,21(06X):12-14. 被引量:6
  • 3D.Kulger, H Vogt Off-line payment with auditable tracing[A].Financial cryptography-FC'2002[C].Berlin:Springer-Verlag,2002.42-55
  • 4D.Ferraiolo, J. Cugini, and D. Kuhn, "Role-Based Access Control(RBAC): Features and Motivations," Proc. Computer Security Applications Conf. pp. 241-248, 1995.
  • 5M.Abe,T Okamoto.Provably secure partially blind signatures[A].Advances in Cryptology-CRYPTO' 2000[C].Berlin:Springer-Verlag,2000. 271 - 286.
  • 6T. EIGamal, "Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory,vol. 31, pp. 469-472, 1985.
  • 7S.Brands.Untraceable off-line cash in wallet with observer[A].Advances in Cryptology-CRYPTO'93 [C].Berlin:Springer-Verlag,1993,302-318.

二级参考文献4

  • 1(美)JessGarms DanielSomerfield著 庞南管和昌 陈立志译.Java安全性编程指南[M].北京:电子工业出版社,2002..
  • 2(美)JamieJaworski著 邱仲潘译.Java安伞手册[M].北京:电子r业出版社,2001..
  • 3IBM Trust Establishment User's Guide. http://www.hrl.il.ibm.com/trustestablishment/.
  • 4(美)Yulian Wang, SPKIo Helsinki University of Technology.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部