全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

动态门限追踪匿名认证方案 Traceable Anonymous Authentication Scheme with Dynamic Threshold

Keywords: 匿名认证,追踪性,门限性,动态性,Lagrange插值

Full-Text   Cite this paper   Add to My Lib

Abstract:

现有的门限可追踪匿名认证方案中,追踪的门限值是固定不变的,如果改变门限值,系统需要重新初始化,导致私钥等信息的利用率较低.为解决这个问题,基于离散对数假设和Diffie-Hellman(DDH)假设,提出了一种动态门限追踪的匿名认证方案.该方案具有两个特点:1)借助环签名,匿名认证实现简单;2)引入动态认证加密思想,追踪的门限值允许动态改变.有效性分析表明:与已有方案相比,在允许动态改变匿名追踪的门限值的情况下,计算代价增加不多.因此该方案更能推向实际应用

References

[1]  RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Proceedings of ASIACRYPT’01.Berlin:Springer-Verlag,2001:552-565.
[2]  MANULIS M.Democratic group signature:On an example of joint ventures[C]//Proceedings of ACM Symposium on Information,Computer and Communications Security.New York:ACM Press,2006:191-196.
[3]  刘方斌,张琨,李海,等.无可信中心的门限追踪ad hoc网络匿名认证[J].通信学报,2012,33(8):208-213.LIU F B,ZHANG K,LI H,et al.Threshold traceability anonymous authentication scheme without trusted center for ad hoc network[J].Journal of Communications,2012,33(8):208-213(Ch).
[4]  CHOI S G,PARK K,YUNG M.Short traceable signatures based on bilinear pairings[C]//Advances in Information and Computer Security,First International Workshop on Security,IWSEC,2006.Berlin:Springer-Verlag,2006:88-103.
[5]  SHIN S,KWON T.AAnA:Anonymous authentication and authorization based on short traceable signatures[J].International Journal of Information Security,2014,13(5):477-495.
[6]  ABE M,OHKUBO M,SUZUKI K.1-out-of-n signatures from a variety of keys[C]//Proceedings of ASIACRYPT’02.Berlin:Springer-Verlag,2002:415-423.
[7]  殷凤梅,侯整风,濮光宁.可选子密钥的门限追踪匿名认证方案[J].武汉大学学报(理学版),2015,61(6):549-553.DOI:10.14188/j.1671-8836.2015.06.008.YIN F M,HOU Z F,PU G N.Self-selecting share threshold traceable anonymous authentication scheme[J].Journal of Wuhan University(Natural Science Edition),2015,61(6):549-553.DOI:10.141881J.1671-8836.2015.06.008(Ch).
[8]  甘元驹,彭银桥,梅其祥.防欺诈的动态(t,n)认证加密方案[J].电子科技大学学报,2011,40(2):201-203.DOI:10.3969/j.issn.1001-0548.2011.02.008.GAN Y J,PENG Y Q,MEI Q X.Dynamic(t,n)authenticated encryption scheme for cheat-proof[J].Journal of University of Electronic Science and Technology of China,2011,40(2):201-203.DOI:10.3969/j.issn.1001-0548.2011.02.008(Ch).
[9]  田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740.TIAN Z J,WANG J L,WU Y X.A dynamic anonymous authentication scheme with identity escrow[J].Journal of Electronics&Information Technology,2005,27(11):1737-1740(Ch).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133