期刊文献+

基于大数分解的一次性身份识别协议

One-time Identification Protocol Based on Large Numbers Factorization
下载PDF
导出
摘要 针对现有的身份识别协议效率不高的问题,利用大数分解的困难性和多元一次同余不定方程解的结构形式,构造了随机"询问与应答"的一个四步交互式身份识别协议.该协议符合身份证明系统的完备性、正确性、安全性和零知识性的要求,既没有被附加任何复杂性假设和用户的计算能力假设,又能做到对用户身份的一次性识别. In order to deal with the inefficient problem of the existing identification protocol,a four-step interactive identification protocol was constructed by using the difficulty of large numbers factorization and the solution constitutional formula of multivariate linear coresidual indeterminate equation. Any complexity assumption and power of prover was not relied on and any random challenge-response could be accomplished in the protocol. Some conditions of the interactive identification proof systems such as completeness and correctness as well as security and zero-knowledge were possessed by the protocol. Moreover,identification of user could be finished at one time.
作者 李滨
出处 《郑州大学学报(理学版)》 CAS 北大核心 2015年第3期49-54,共6页 Journal of Zhengzhou University:Natural Science Edition
基金 四川省教育厅科研基金资助重点项目 编号12ZB276
关键词 大数分解 身份识别 不定方程 询问与应答 协议 large number factorization identification indeterminate equation challenge and response protocol
  • 相关文献

参考文献14

  • 1Goldwasser S, Micali S, Yao A C. Strong signature schemes [ C]//Proceedings of 15th Annual ACM Symposium on Theory of Computing. New York, 1983:431 -439.
  • 2Fiat A, Shamir A. How to prove yourself: practical solutions to identification and signature problems [ C ]// Proceedings on Ad- vances in Cryptology. Berlin, 1987:186- 194.
  • 3Feige U, Fiat A, Shamir A. Zero-knowledge proofs of identity [J] . Journal of Cryptology, 1988, 1(2) :77 -94.
  • 4Dwork C, Naor M, Reingold O. Magic functions [J]. Journal of the ACM, 2003, 50(6) :852 -921.
  • 5Goldwasser S, Tauman Y. On the security of the Fiat-Shamir paradigm [ C]//Proceedings of 44th Annum IEEE Symposium on Foundations of Computer Science. New York, 2003:102 -115.
  • 6Schnorr C P. Efficient signature generation by smart cards [J]. Journal of Cryptology, 1991,4(3) :161 -174.
  • 7Boneh D, Boyen X. Short signature without random oracles and the SDH assumption in bilinear groups [ J]. Journal of Cryptolo- gy, 2008, 21(2):149-177.
  • 8Haitner I. A parallel repetition theorem for any interactive argument [ C]//Proceedings of 50th Annual IEEE Symposium on Foundation of Computer Science. New York, 2009:241 -250.
  • 9DING Ning,GU DaWu.Precise bounded-concurrent zero-knowledge proofs for NP[J].Science China(Information Sciences),2010,53(9):1738-1752. 被引量:1
  • 10Zaverncha G M, Stinson D R. Short one-time signatures [ J ]. Advances in Mathematics of Communications, 2011, 5 (3) :473 - 488.

二级参考文献39

  • 1王海龙,孟令启,马金亮,徐如松.基于RBF神经网络的热轧碳钢变形抗力预测[J].郑州大学学报(理学版),2007,39(3):131-135. 被引量:5
  • 2赵腊生,张强,魏小鹏.语音情感识别研究进展[J].计算机应用研究,2009,26(2):428-432. 被引量:21
  • 3Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof-systems. In: Proc 17th STOC. New York: ACM, 1985. 291-304.
  • 4Goldreich O. Foundations of Cryptography - Basic Tools. Cambridge: Cambridge University Press, 2001.
  • 5Micali S, Pass R. Local zero knowledge. In: Proc 38th STOC. New York: ACM, 2006. 306-315.
  • 6Pass R. A precise computational approach to knowledge. Dissertation for the Doctoral Degree. Cambridge: MIT, 2006.
  • 7Barak B. How to go beyond the black-box simulation barrier, In: Proc 42nd FOCS. Los Alamitos: IEEE, 2001. 106-115.
  • 8Pandey O, Pass R, Sahai A, et al. Precise concurrent zero-knowledge. In: Proc Eurocrypt'08. LNCS 4965. Berlin: Springer-Verlag, 2008. 397~414.
  • 9Kilian J, Petrank E. Concurrent and resettable zero-knowledge in poly-logarithmic rounds. In: Proc STOC'01. New York: ACM, 2001. 560-569.
  • 10Prabhakaran M, Rosen A, Sahai A. Concurrent zero knowledge with logarithmic round-complexity. In: Proc 43rd FOCS. Los Alamitos: IEEE, 2002. 366-375.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部