首页 | 本学科首页   官方微博 | 高级检索  
     

可监管匿名认证方案
引用本文:王震,范佳,成林,安红章,郑海彬,牛俊翔.可监管匿名认证方案[J].软件学报,2019,30(6):1705-1720.
作者姓名:王震  范佳  成林  安红章  郑海彬  牛俊翔
作者单位:保密通信重点实验室, 四川 成都 610041,保密通信重点实验室, 四川 成都 610041,中国信息安全评测中心, 北京 100085,保密通信重点实验室, 四川 成都 610041,北京航空航天大学 电子信息工程学院, 北京 100191,北京航空航天大学 电子信息工程学院, 北京 100191
基金项目:国家重点研发计划(2017YFB0802300)
摘    要:随着互联网中隐私保护技术的发展,身份认证已成为保护计算机系统和数据安全的一道重要屏障.然而,信息技术的快速发展使传统身份认证手段暴露出一些弊端,例如,区块链技术的兴起对身份认证提出了更高的要求,在认证身份的同时需要保护用户的身份隐私等.采用匿名认证技术可解决用户身份隐私泄露的问题,但目前大多数方案未考虑可监管的问题,一旦用户出现不诚信行为,很难进行追责,因此,需要在匿名认证过程中建立监管机制.针对以上问题和需求,主要设计了一种可监管的匿名认证方案,通过匿名证书的方式确定用户的资源访问权限和使用权限,同时,用户在出示证书时可选择性地出示属性,确保用户的隐私信息不过度暴露;此外,方案中引入监管机制,可信中心(CA)对匿名认证过程进行监管,一旦出现欺诈行为,可对相关责任人进行追责.该方案主要采用安全的密码学算法构建,并通过了安全性的分析证明,能够高效实现可监管的匿名身份认证,适宜在区块链(联盟链)和其他具有匿名认证需求和可监管需求的系统中使用.

关 键 词:身份认证  区块链  匿名性  可监管
收稿时间:2018/6/26 0:00:00
修稿时间:2018/10/12 0:00:00

Supervised Anonymous Authentication Scheme
WANG Zhen,FAN Ji,CHENG Lin,AN Hong-Zhang,ZHENG Hai-Bin and NIU Jun-Xiang.Supervised Anonymous Authentication Scheme[J].Journal of Software,2019,30(6):1705-1720.
Authors:WANG Zhen  FAN Ji  CHENG Lin  AN Hong-Zhang  ZHENG Hai-Bin and NIU Jun-Xiang
Affiliation:Science and Technology on Communication Security Laboratory, Chengdu 610041, China,Science and Technology on Communication Security Laboratory, Chengdu 610041, China,China Information Technology Security Evaluation Center, Beijing 100085, China,Science and Technology on Communication Security Laboratory, Chengdu 610041, China,School of Electrinic and Information Engineering, Beihang University, Beijing 100191, China and School of Electrinic and Information Engineering, Beihang University, Beijing 100191, China
Abstract:With the development of the privacy protection technology of the Internet, identity authentication has been a guardian of data andcomputer system. However, there exists some weaknesses in traditional identity authentication technology asit does notmeet requirements of the new information technology, i.e., the rise of the blockchain has raised higher requirements for identity authentication and it not only needs to identify different users but also has the necessary to protect the privacy of the users. Anonymous authentication technology is a method to protect users'' privacy hiding, but most existing schemes do not supporta proper supervision mechanism. Once a user is dishonest, it is difficult to trackits real identity. Therefore, it is necessary to establish a regulatory mechanism in the process of anonymous authentication. In this study, a supervised anonymous authentication scheme is proposed to solve above problems. On the one hand, access rights are provided for users by anonymous credentials, and users can selectively exposetheir attributes when they need to present their credentials. In this way, it can assure that users'' information is under protection. On the other hand, a regulatory mechanism is introduced in anonymous authentication, which can track the real identity when cheating occurs.The supervised anonymous authentication scheme is constructed by secure cryptographic schemes and it is proved to be semantic secure. The proposed scheme is efficient and can be applied toconsortium blockchain and other supervised anonymous authentication systems.
Keywords:identity authentication  blockchain  anonymity  supervision
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号