期刊文献+

非交互式可否认认证协议的研究

Researches on non-interactive deniable authentication protocols
下载PDF
导出
摘要 为满足在电子商务和电子政务等领域中的应用要求,深入分析和研究了非交互式可否认认证协议的理论和相关应用。根据不同的应用环境,将可否认认证协议分为交互式和非交互式两类,并分析了这两种类别协议的通信轮数的开销,指出在电子投票和电子邮件协商等应用中需要非交互式的可否认认证这一结论。最后,在对几个典型的非交互式可否认认证协议分析的基础上,指出现有的成果不能满足应用的需要,探讨了在非交互式可否认认证领域的研究方向。 To satisfy the application requirement in electronic commence and electronic government field,the characteristic and the application of non-interactive deniable authentication protocols are intensively researched.According to the various applications,the deniable authentication protocols are divided into interactive protocols and non-interactive protocols.The cost of the communication rounds about the two types of protocols are analyzed and the fact that electronic voting and E-mail negotiation need non-interactive protocols is proposed.Finally,based on the analysis of some typical non-interactive protocols,the fact that the present researches cannot satisfy the needs of applications is pointed out,and the future research aspects about non-interactive deniable authentication are discussed.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第10期2223-2226,共4页 Computer Engineering and Design
基金 民航局科研基地863基金项目(2007kf003)
关键词 认证协议 双线性对 可否认认证 基于身份密码体制 非交互式协议 authentication protocols bilinear pairings deniable authentication identity-based cryptography non-interactive protocols
  • 相关文献

参考文献9

  • 1Canetti R, Dwork C,Naor M, et al.Deniable encryption[C].Proceedings of Crypto, 1997.
  • 2Dwork C,Naor M,Sahari A.Concurrent zero knowledge[C].Proceedings of the 30th STOC,1998,.
  • 3冯涛,马建峰.基于证人不可区分的通用可复合安全并行可否认认证[J].软件学报,2007,18(11):2871-2881. 被引量:5
  • 4Jiang S,Safavi-Naini R.An efficient fully deniable key exchange protocol,financial cryptography and data security[C]. 12th International Conference,2008.
  • 5Shao Z.Efficient deniable authentication protocol based on generalized E1Gamal signature scheme[J].Computer Standards and Interfaces,2004,26:449-454.
  • 6Mu Y, Zhang F, Susilo W.Deniable partial proxy signatures[C]. ASIAN,2004:182-194.
  • 7Boyd C,Mao W, Kenneth G Paterson.Deniable authenticated key establishment for intemet protocols[C].Security Protocols,2005: 255-271.
  • 8Cao T, Dai L,Xue R.An efficient ID-based deniable authentication protocol from pairings[C].Proceedings of the 19th International Conference on Advanced Information Networking and Applications,2005.
  • 9Lu R,Cao Z.A new deniable authentication protocol from bilinear pairings [J]. Applied Mathematics and Computation, 2005,168: 954-961.

二级参考文献1

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部