首页 | 本学科首页   官方微博 | 高级检索  
     

一个动态的可追踪匿名认证方案
引用本文:田子建, 王继林, 伍云霞. 一个动态的可追踪匿名认证方案[J]. 电子与信息学报, 2005, 27(11): 1737-1740.
作者姓名:田子建  王继林  伍云霞
作者单位:中国矿业大学信息研究所,北京,100083;浙江财经学院信息学院 杭州 310012
基金项目:中国科学院资助项目;高等学校博士学科点专项科研项目
摘    要:该文提出了一个支持身份追踪的匿名认证方案。该方案有下列优点:(1)用户动态加入和吊销特别方便,管理员仅需在公告牌上公布和删除该成员的相关数据。(2)示证人可以灵活地、主动地选择匿名范围,即他可以任意选取多个合法的用户并说明自己在其中。(3)追踪示证人的具体身份是受限制的,管理员无法单独实现身份追踪,必须和验证者合作才能共同追踪示证人的身份。另外,在抵抗外部攻击和伪装攻击方面,该方案具有任意弹性,明显的优于Boneh(1999)的1-弹性方案。

关 键 词:匿名认证  身份追踪  k-弹性
收稿时间:2004-06-15
修稿时间:2004-12-16

A Dynamic Anonymous Authentication Scheme with Identity Escrow
Tian Zi-jian, Wang Ji-lin, Wu Yun-xia. A Dynamic Anonymous Authentication Scheme with Identity Escrow[J]. Journal of Electronics & Information Technology, 2005, 27(11): 1737-1740.
Authors:Tian Zi-jian  Wang Ji-lin  Wu Yun-xia
Affiliation:1 Information Research Institute, China University of Mining and Technology, Beijing 100083, China;2 Information School, of Zhejiang University of Finance and Economics, Hangzhou 310012, China
Abstract:A new anonymous authentication scheme with traceable identity is proposed.This scheme has the following advantages:(1)It is easy for users to dynamically join and leave,the only thing needs to do is manager add or delete the relevant data of users.(2)The prover can unrestrictedly choose a group of users and declare that himself belong to it,so he can choose his anonymous scope initiatively and freely.(3)In the process of trace the identity of prover,the right of manager is restricted,he needs cooperation with the verifiers to reveal the identity of the prover.In the aspect of against outside attack and masking attack,compared with the scheme 1-resilient of Boneh(1999),this scheme can realize arbitrary resilience.
Keywords:Anonymous authentication  Identity escrow  k-resilient
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号