期刊文献+

一种面向付费个性化服务的匿名认证方案 被引量:3

An Anonymous Authentication Method for Toll Personalized Service
下载PDF
导出
摘要 个性化服务系统为每个用户提供了满足个性化需求的差异服务,但用户模型的建立和更新依赖于用户的个人信息,存在着隐私泄漏的风险,从而降低了用户使用个性化服务的意愿。本文基于可信计算环境下直接匿名证言方案的可变假名机制,设计了一个面向通用网络环境下个性化服务的匿名认证方案,并针对付费系统的匿名保持问题做了进一步改进。理论分析和实验结果表明,个性化服务提供者可以鉴别用户是否合法付费用户,并具有何种访问权限,但无法确定用户的具体身份,即使服务提供者将访问信息泄漏,也不会危及用户隐私。 Personalized service system provides differential services that satisfy the personalized needs of users. However, both generating and updating users' models depend on private information, thus disclosure of privacy is possible. This could limit users' willingness to use these personalized services. Basing on the pseudonymity of direct anonymous attestation scheme, this paper proposes an anonymous authentication method for personalized service in general networks. Some fringe improvements are also done for holding anonymity in a toll system. Theoretical analysis and experimental results demonstrate that the service provider can know whether a user is regular, and which access right the user has, but it cannot identify the user. Even if the service provider reveals access information, users' privacy will not be endangered.
出处 《计算机科学》 CSCD 北大核心 2008年第4期248-251,共4页 Computer Science
基金 河南省自然科学基金项目(0511014300) 国家"863"高技术研究发展计划项目(200AA142170)
关键词 个性化服务 等级会费制 隐私保护 匿名认证 Personalized service, Graded fee system, Privacy protection, Anonymous authentication
  • 相关文献

参考文献12

  • 1Mladenic D. Machine learning for better Web browsing. In: AAAI 2000 Spring Symposium Technical Reports on Adaptive User Interfaces, AAAI Press, 2000.82-84
  • 2Mobasher B, Cooley R, Srivastava J. Automatic personalization based on Web usage mining. Communications of the ACM, 2000, 43(8): 142-151
  • 3潘金贵,胡学联,李俊,张灵玲.一个个性化的信息搜集Agent的设计与实现[J].软件学报,2001,12(7):1074-1079. 被引量:30
  • 4Tehzrow M, Kobsa A. Impacts of user privacy preferences on personalized systems: A comparative study. In: Designing Personalized User Experiences for eCommerce, Kluwer Academic Publishers, 2004. 315-332
  • 5Saito T, Umesawa K, Okuno H. Privacy-enhanced access control by SPKI and its application to Web server. In: Proc. of IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE Computer Society, 2000. 201-206
  • 6Saito T, Umesawa K, Kito T, et al. Privacy-enhanced SPKI access control on PKIX and its application to Web server. In: Proc. of the 17th International Conference on Advanced Information Networking and Application, IEEE Computer Society, 2003. 696-703
  • 7Kakizaki Y, Yamamoto H. A proposal of an anonymous authentication method for flat-rate service. In: Proc. of the First International Conference on Availability, Reliability and Security, IEEE Computer Society, 2006. 551-557
  • 8Teranishi I, Furukawa J, Sako K. k-times anonymous authentication. In: ASIACRYPT 2004, LNCS 3329, Springer-Verlag, 2004. 308-322
  • 9Brickell E, Camenisch J, Chen L. Direct anonymous attestation. In: Proc. of the 11th ACM Conference on Computer and Communications Security, ACM Press, 2004. 132-145
  • 10Trusted Computing Group. TPM main part 1 design principles specification version 1. 2. http://www. trustedcomputinggroup. org, 2003

二级参考文献1

共引文献29

同被引文献27

  • 1万仁福,李方伟,朱江.匿名双向认证与密钥协商新协议[J].电子科技大学学报,2005,34(1):61-64. 被引量:5
  • 2毛剑,杨波,王育民.保护隐私的数字产品网上交易方案[J].电子学报,2005,33(6):1053-1055. 被引量:11
  • 3赵春明,葛建华,李新国.基于RSA数字签名的增强不经意传输协议[J].西安电子科技大学学报,2005,32(4):562-565. 被引量:4
  • 4AIMEURE, BRASSARD G, FERNANDEZ J M, et al. Alambic: a privacy-preserving recommender system for electronic commerce[J]. International Journal of Information Security,2008,7(5) :307-334.
  • 5BAO F, DENG R H. An efficient and practical scheme for privacy protection in the E-commerce of digital goods[C]//Information Security and Cryptology-ICISC 2000, LNCS2015. Berlin: Springer Verlag, 2001 : 162- 170.
  • 6AIELLO B, ISHAI Y, REINGOLD O. Priced oblivious transfer: how to sell digital goods[C]//Advances in Cryptology- EUROCRYPT 2001, LNCS 2045. Berlin: Springer Verlag, 2001:119-135.
  • 7OGAWA K, HANAOKA G, KOBARA K, etal. Anonymous pay-TV system with secure revenue sharing[C]//Knowledge- Based Intelligent Information and Engineering Systems, LNCS 4694. Berlin: Springer Verlag, 2009:984-991.
  • 8LI N H, DU W L, BONEH D. Oblivious signature-based envelope[J]. Distributed Computing, 2005, 17(4):293- 302.
  • 9NASSERIAN S, TSUDIK G. Revisiting oblivious signaturebased envelopes[C]//Finaneial Cryptography and Data Security, LNCS 4107. Berlin: Springer Verlag, 2006:221-235.
  • 10Jiang Yixin, Lin Chuang. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks [ J]. IEEE Trans on Wireless Communications, 2006, 5(9): 1-8.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部