期刊文献+

普适环境中基于身份的跨域认证方案 被引量:19

Identity-based cross-domain authentication scheme in pervasive computing environments
下载PDF
导出
摘要 利用椭圆曲线加法群提出了一种基于身份的签名算法,算法中签名的验证结果相对于签名者身份是一个常量,该算法可保证跨域认证中用户身份的匿名性,并且避免了复杂的双线性对运算。基于该算法设计了一种普适环境中的跨域认证方案,方案中用户利用该算法对时戳签名作为认证信息,在实现安全跨域认证的同时实现了用户匿名性。分析表明,该方案同时具有安全和效率上的优势,更加适合在普适环境下应用。 An identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer's identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operation.Then a cross-domain authentication scheme was constructed by combining the proposed signature scheme.During the authentication,a user constructed the signature of timestamp as authentication proof,which realized secure cross-domain authentication and user anonymity.It is shown that the proposed scheme has superiority in both security and efficiency,and is more suitable for pervasive computing.
出处 《通信学报》 EI CSCD 北大核心 2011年第9期111-115,122,共6页 Journal on Communications
基金 国家高技术研究发展计划("863"计划)基金资助项目(2009AAJ124) 现代通信国家重点实验室基金资助项目(9140C1107020905)~~
关键词 普适计算 跨域认证 基于身份的密码体制 匿名 pervasive computing cross-domain authentication identity-based cryptography anonymity
  • 相关文献

参考文献6

  • 1BELLARE M, NAMPREMPRE C, NEVEN G Security proofs for identity-based identification and signature schemes[A]. EUROCRYPT 2004[C]. Interlaken, Switzerland, 2004. 268-286.
  • 2LEE D G, KANG S I, SEO D H, et al. Authentication for single/multi domain in ubiquitous computing using attribute certification[A]. In- ternational Conference on Computational Science and Its Applications[C]. Glasgow, UK, 2006. 326-335.
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:56
  • 4YAO L, WANG L, KONG X W, et al. An inter-domain authentication scheme for pervasive computing environment[J]. Computers and Mathematics with Applications, 2010, 59(2):811-821.
  • 5CHAN Y Y, FLEISSNER S. Single sign-on and key establishment for ubiquitous smart environments[A]. International Conference on Computational Science and Its Applications[C]. Glasgow, UK, 2006. 406-415.
  • 6朱辉,李晖,苏万力,王育民.基于身份的匿名无线认证方案[J].通信学报,2009,30(4):130-136. 被引量:16

二级参考文献25

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:56
  • 4彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 5PARK J, GO J, KIM K. Wireless authentication protocol preserving user anonymity[A]. Proceedings of the 2001 Symposium on Cryptography and Information Security[C]. Janpan, 2001
  • 6WONG D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[A]. PerCom 2005 Workshops[C]. Kauai Island, Hawaii, 2005
  • 7KANG M H, RYOU H B, CHOI W. Design of anonymity-preserving user authentication and key agreement protocol for ubiquitous computing environments[A].WINE 2005[C]. Hong Kong China, 2005.
  • 8KLM W H, YOON E J, YOO K Y. New authentication protocol providing user anonymity in open network [A]. WINE 2005[C]. Hong Kong, China, 2005.
  • 9BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 10BAEK J, SAFAVI-NAINI R, SUSILO W. Universal designated verifier signature proof[A]. Advances in Cryptology- Asiacrypt'05[C]. Berlin: Springer-Verlag, 2005. 644-661.

共引文献62

同被引文献165

引证文献19

二级引证文献126

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部