期刊文献+

基于线性方程组的门限匿名认证方案

Threshold anonymous authentication scheme based on linear equations
下载PDF
导出
摘要 现有的很多匿名认证方案中,匿名认证过程较为复杂,匿名的可控性比较随意,针对这两个问题,在求解离散对数困难性的基础上,提出了一个新的门限匿名认证方案。借助线性方程组的求解理论,获得成员的秘密份额和公钥身份等信息;基于门限共享的思想,实现示证者身份的匿名认证和匿名追踪。该方案中认证者的匿名性、门限可追踪性以及身份的不可冒充性满足了匿名认证的安全需求,在电子商务、移动通信等众多领域将具有广阔的应用前景。 Among the most of present anonymous authentication schemes, anonymous authentication process is complex, and the anonymous controllability is optional. To solve these two problems, a new threshold anonymous authentication scheme based on the intractability of the discrete logarithm is presented. With the help of the theory of solving linear equations, the member can get a share and the public key etc. Based on the idea of threshold secret sharing, the prover can be anonymous authenticated and anonymous tracked. The prover of the scheme is anonymous, threshold traceable, and inimitable, which can make the scheme well satisfy the security of anonymous authentication. The scheme will have broad application pros- pects in many fields such as electronic commerce, mobile communication.
出处 《计算机工程与应用》 CSCD 北大核心 2015年第1期97-101,共5页 Computer Engineering and Applications
基金 安徽省高等学校省级优秀青年人才基金重点项目(No.2013SQRL063ZD) 安徽省高等学校省级质量工程教学研究项目(No.2013jyxm174)
关键词 匿名认证 秘密共享 线性方程组 追踪性 门限性 anonymous authentication secret sharing linear equations traceability threshold
  • 相关文献

参考文献15

  • 1Ateniese G,Herzberg A,Krawczyk H,et al.Untraceable mobility or how to travel incognito[J].Computer Networks,1999,31(8):871-884.
  • 2Kong J J,Hong X Y,Gerla M.An identity-free and ondemand routing scheme against anonymity threats in mobile Ad Hoc networks[J].IEEE Transactions on Mobile Computing,Frequency,2007,6:888-902.
  • 3Lee C H,Deng X T,Zhu H F.Design and sccurity analysis of anonymous group identification protocols[C]//Proceedings of Pulic Key Cryptography,February 2002,Paris,France.Berlin Heidelberg:Springer-Verlag,2002:188-198.
  • 4Eliane J,Guillaume P.On the security of homage group authentication protocol[C]//Proceedings of Cayman Islands,British West Indies,Feb 19-22,2001,2339:106-116.
  • 5Xu Z M,Tian H,Liu D S,et al.A ring-signature anonymous authentication method based on one-way accumulator[C]//Proceedings of Communication Systems,Networks and Applications Conference,2010:56-59.
  • 6周彦伟,吴振强,蒋李.分布式网络环境下的跨域匿名认证机制[J].计算机应用,2010,30(8):2120-2124. 被引量:10
  • 7宋成,孙宇琼,彭维平,罗守山,辛阳,胡正名.改进的直接匿名认证方案[J].北京邮电大学学报,2011,34(3):62-65. 被引量:9
  • 8Hirose S,Yoshida S.A user authentication scheme with identity and location privacy[C]//Proceedings of the 6th Australasian Conference on Information Security and Privacy,Sydney,Australia,July 11-13,2001,2119:235-246.
  • 9田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 10Paik J H,Kim B H,Lee D H.A3RP:anonymous and authenticated ad hoc routing protocol[C]//Proceedings of Information Security and Assurance Conference,2008.

二级参考文献58

  • 1田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 2刘锋,张建中.可公开验证的动态秘密分享机制[J].微电子学与计算机,2005,22(12):104-105. 被引量:2
  • 3石润华,黄刘生.一种新的门限秘密共享方案[J].合肥工业大学学报(自然科学版),2006,29(2):164-168. 被引量:4
  • 4张帆,马建峰,文相在.通用可组合的匿名HASH认证模型[J].中国科学(E辑),2007,37(2):272-284. 被引量:5
  • 5WILLIAN Stallings 杨明(译).密码编码学与网络安全:原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 6Trusted Computing Group.Trusted Computing Platform Alliance main specification version 1.1b[EB/OL].[2009-11-10].http://www.Trustedcomputinggroup.org.
  • 7Trusted Computing Group.TPM main part 1 design principles specification version 1.2[EB/OL].[2009-12-01].http://www.Trustedcomputinggroup.org.
  • 8BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C] // Proceedings of the 11th ACM Conference on Computer and Communications Security.New York:ACM,2004:132-145.
  • 9BRICKELL E,CHEN L,LI J.Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[R].Cryptology Reprint Archive,2008.
  • 10Trusted Computing Group.Trusted Computing Group TPM vl.2 Specification Changes:a Summary of Changes with respect to the v1.1b TPM Specification[EB/OL].[2009-12-10].http://www.trustedcomputinggroup.org.

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部