共查询到18条相似文献,搜索用时 343 毫秒
1.
零知识证明协议是一种非常强大的密码系统。大部分的零知识身份识别方案的安全性是基于复杂的数学算法,和交互双方大规模的计算,即证明者和示证者。而视觉密码技术是一种特别的不需要了解密码学和相应的复杂的数学计算的密码学。因此提出了一个新的基于视觉密码的零知识身份证明方法,克服了当前零知识身份证明协议依赖计算设备和复杂计算。 相似文献
2.
物联网的发展对射频识别(RFID)系统的安全性能提出了越来越高的要求。虽然基于密钥阵列的RFID认证协议解决了传统RFID认证协议在多实体环境中存在的内部攻击问题,但基于交换实体身份信息的认证方式存在信息泄露的安全隐患。针对这一问题,设计了基于零知识证明的多实体RFID认证协议(MERAP)。该协议采用分布式密钥阵列抵御内部攻击,利用零知识证明方案实现双向认证时敏感身份信息零泄露。性能分析结果显示,MERAP协议在维持一定复杂度和标签成本的基础上,可抵抗包括重传、跟踪、拒绝服务和篡改等多种外部攻击和内部攻击。 相似文献
3.
基于不可否认签名和可证实签名的思想,提出了一种拥有DSA数字签名的零知识证明新方案.该方案给出了防止DSA数字签名任意传播的一种新方法--签名者不直接提供对信息M的签名,而是提供拥有该信息的数字签名的一个零知识证明.该方案是不可否认签名功能的扩充--零知识证明签名的有效性,也是可证实数字签名的改进,比可证实数字签名方案简单且不需要第三方的参与.在哈希函数在随机神谕的模型下是安全的和计算离散对数是困难的假设下,系统是安全的. 相似文献
4.
5.
6.
7.
8.
为防止签名验证者利用部分签名取得不公平的优势,Huang等人提出混淆乐观公平交换(Ambiguous Optimistic Fair Exchange,AOFE)方案及其一般构造方法,但是其构造方法没有考虑真实的用户环境.在基于IBC(Identity-Based Cryptography)的用户环境下,文章提出基于身份的混淆乐观公平交换(ID-AOFE)方案构造方法、方案实例、及其选择身份安全模型.提出的ID-AOFE构造方法对Huang等人的AOFE方案进行了简化,采用具有信息提取功能的证据不可区分证明算法替换原方案模型中的基于标签加解密和零知识证明算法.ID-AOFE安全模型以Huang等人的AOFE安全模型为基础,融合了选择身份安全模型,并对ID-AOFE方案的安全性进行了归纳和重新定义.在选择身份安全模型下,提出的ID-AOFE方案实例的公平性被规约到经典密码原语的安全性.此外,文章探讨了ID-AOFE方案的消息交互模型,就争端解决的方案和过程进行了重点分析. 相似文献
9.
戴军 《信息安全与通信保密》2007,(4):113-115
论文在离散对数基础上,提出了一种基于高阶非线性变系数差分变换的新的零知识证明算法。使用高阶差分状态序列,增强了系统因果强度,加强了抵抗身份欺骗和差分分析攻击的能力。把差分方法和输入输出表引入到零知识证明算法,开拓了零知识证明身份认证协议这一密码学前沿领域的研究思路。 相似文献
10.
信息安全技术是保障各种网络应用正常运作的必要支撑,而身份认证是信息安全保障技术的重要组成部分。丈中简单分析了传统网络身份认证技术存在的安全缺陷,然后介绍了生物特征识别技术及其国内外应用情况。最后提出了一种把生物特征识别技术与公钥密码技术相结合的多层次身份认证方案,该方案解决了传统身份认证方案的部分缺点,增强了身份认证安全性,为实现更为安全可靠的网络安全体系提供技术支撑。 相似文献
11.
针对零知识身份认证协议存在的问题,根据数字水印能隐藏信息的特点,提出了一种新的零知识身份认证协议。在此协议中使用数字水印改善了认证的特性。在认证过程中,验证者在验证示证者身份时需要两方面的信息:一是来自网络的信息,二是本地的信息,从而有效地解决了存在的问题,提高了认证的安全性。 相似文献
12.
13.
14.
15.
16.
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage caused by the key exposure in the identity-based (ID-based) signature scenarios efficiently, we propose an ID-based key-insulated signature scheme in this paper, which eliminates the expensive bilinear pairing operations. Compared with the previous work, our scheme minimizes the computation cost without any extra cost. Under the discrete logarithm (DL) assumption, a security proof of our scheme in the random oracle model has also been given. 相似文献
17.
In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks. Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery. 相似文献
18.
Gottesman D. Hoi-Kwong Lo 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(2):457-475
Shor and Preskill (see Phys. Rev. Lett., vol.85, p.441, 2000) have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (1984) by demonstrating a connection between key distribution and entanglement purification protocols (EPPs) with one-way communications. Here, we provide proofs of security of standard quantum key distribution schemes, Bennett and Brassard and the six-state scheme, against the most general attack, by using the techniques of two-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in quantum key distribution (QKD). This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) Bennett and Brassard that can tolerate a bit error rate of up to 18.9%, which is higher than what any Bennett and Brassard scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over Bennett and Brassard by showing that the six-state scheme can strictly tolerate a higher bit error rate than Bennett and Brassard. In particular, our six-state protocol can tolerate a bit error rate of 26.4%, which is higher than the upper bound of 25% bit error rate for any secure Bennett and Brassard protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols. 相似文献