期刊文献+

一种具有公平匿名性的k次认证机制 被引量:1

Fair k-times anonymous authentication scheme
下载PDF
导出
摘要 为了保证合法用户的隐私,基于Teranisi提出的k次认证机制(k-TAA),利用Brands提出的表示问题不可解的猜想,构造了一个具有公平的匿名性的k次认证机制k-TFAA。该机制除了拥有k-TAA机制的所有特性外,还增加了一个可信方,该可信方可以有效追踪非法使用服务的用户的身份,保证了整个机制的完备性和安全性。最后,对该机制的各个特性进行了讨论。 In order to protect the users' privacy,based on the theory and construction of k-TAA presented by Teranisi,presented a fair k-TAA scheme used the blind signature.The scheme added trustee that could easily trace the ID of illegal users and kept the other properties remain at the same time.The appearance of trustee confirms the security of the scheme.The paper also gave all the properties' discussion at last.
作者 邓宇乔
出处 《计算机应用研究》 CSCD 北大核心 2011年第6期2227-2229,共3页 Application Research of Computers
基金 广东商学院博士资助项目(10BS41302)
关键词 k次认证机制 表示问题 离散对数 盲签名 公平匿名性 k-TAA(k-times anonymous authentication) representation problem discrete logarithm blind signature scheme fair anonymousness
  • 相关文献

参考文献11

  • 1DAMGARD I, JURIK M. A generalization, a simplification and some applications of paillier' s probabilistic public-key system [ C ]// Proc of the 4th International Conference on Practice and Theory in Public Key Cryptography. Berlin : Springer, 2001 : 119-136.
  • 2FURUKAWA J, SAKO K. An efficient scheme for proving a shuffle [ C]//Proc of the 21st International Cryptology Conference. Berlin: Springer, 2001 : 368- 387.
  • 3BRANDS S. An efficient off-line electronic cash system based on the representation problem,CS-R9323 [ R]. Geneva: CWI, 1993.
  • 4BRANDS D. Untraceable off-line cash in wallets with observers [ C ]// Proc of the 13th Inter nationational Cryptology Conference. Berlin: Springer, 1993:302-318.
  • 5俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:142
  • 6TERANISI I, FURUKAWA J, SAKO K. k-times anonymous authenti- cation [ C ]//Advances in Cryptology ASIACRYPT. Berlin : Springer, 2004 : 308- 322.
  • 7NGUYEN L,SAFAVI-NAINI R. Dynamic k-times anonymous authen- tication[ C]//Proc of the 3rd Applied Cryptography and Network Se- curlty Conference. Berlin : Springer, 2005 : 219 - 250.
  • 8NGUYEN L. Efficient dynamic k-times anonymous authentication [ C ]//Proc of the I st International Conference on Cryptology in Viet- nam. Berlin : Springer, 2006 : 81 - 98.
  • 9MOHAMED L, HANS V. Anonymous k-show credentials[ C]//Proc of the 4th European PKI Workshop. Berlin : Springer, 2007 : 181 - 192.
  • 10SCHNORR C P. Efficient signature generation by smart cards [ J ]. Journal of Cryptology, 1991,4(3) : 161-174.

二级参考文献64

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6

共引文献141

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部