期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Anonymity control in electronic check systems
1
作者 马春光 Yang Yixian Hu Zhengming 《High Technology Letters》 EI CAS 2005年第4期355-358,共4页
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. ... Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refired cheeks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairmess is also an important issue in check systelns. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonylnity revocation is introduced to electronic check system for the fitst thne, and a model of fair electronic check system is proposed. An effieient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is elnployed to revoke the anonymity of unhonest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements. 展开更多
关键词 electronic check anonymity revocation RSA-based partially blind signature
下载PDF
Privacy-preserving authentication scheme based on zero trust architecture
2
作者 Fei Tang Chunliang Ma Kefei Cheng 《Digital Communications and Networks》 CSCD 2024年第5期1211-1220,共10页
Zero trust architecture is an end-to end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog... Zero trust architecture is an end-to end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technology in the zero trust network.In this paper,a Traceable Universal Designated Verifier Signature(TUDVS)is used to construct a privacy-preserving authentication scheme for zero trust architecture.Specifically,when a client re-quests access to server resources,we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party.In addition,the security of the proposed scheme is proved and its fficiency is analyzed.Finally,TUDVS is applied to the single packet autho-rization scenario of the zero trust architecture to prove the practicability of the proposed scheme. 展开更多
关键词 Zero trust architecture PRIVACY-PRESERVING Authentication anonymity revocation
下载PDF
An Anonymous Authentication Scheme for Plugin Electric Vehicles Joining to Charging/Discharging Station in Vehicle-to-Grid(V2G) Networks 被引量:2
3
作者 CHEN Jie ZHANG Yueyu SU Wencong 《China Communications》 SCIE CSCD 2015年第3期9-19,共11页
Incorporating electric vehicles into smart grid,vehicle-to-Grid(V2G) makes it feasible to charge for large-scale electric vehicles,and in turn support electric vehicles,as mobile and distributed storage units,to disch... Incorporating electric vehicles into smart grid,vehicle-to-Grid(V2G) makes it feasible to charge for large-scale electric vehicles,and in turn support electric vehicles,as mobile and distributed storage units,to discharge to smart grid.In order to provide reliable and efficient services,the operator of V2 G networks needs to monitor realtime status of every plug-in electric vehicle(PEV) and then evaluate current electricity storage capability.Anonymity,aggregation and dynamic management are three basic but crucial characteristics of which the services of V2 G networks should be.However,few of existing authentication schemes for V2 G networks could satisfy them simultaneously.In this paper,we propose a secure and efficient authentication scheme with privacy-preserving for V2 G networks.The scheme makes the charging/discharging station authenticate PEVs anonymously and manage them dynamically.Moreover,the monitoring data collected by the charging/discharging station could be sent to a local aggregator(LAG)in batch mode.In particular,time overheads during verification stage are independent with the number of involved PEVs,and there is no need to update the membership certificate and key pair before PEV logs out. 展开更多
关键词 smart grid Vehicle-to-Grid(V2G) networks anonymous authentication revocable group signature
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部