计算机科学 ›› 2013, Vol. 40 ›› Issue (11): 122-125.

• 信息安全 • 上一篇    下一篇

一种公平有效的假名管理模型

朱晓玲,陆阳,张本宏,侯整风   

  1. 合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009;合肥工业大学计算机与信息学院 合肥230009
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金项目(60873195),国家“863”计划项目(2011AA060406),安徽省自然科学基金项目(090412051)资助

Efficient Fair Pseudonym Management Model

ZHU Xiao-ling,LU Yang,ZHANG Ben-hong and HOU Zheng-feng   

  • Online:2018-11-16 Published:2018-11-16

摘要: 匿名是实现隐私保护的有效方法。由于恶意用户的存在,一些应用需要匿名追踪。针对当前可追踪匿名方案存在的两个问题:管理员的权利过大,ID和秘密关联的追踪机制产生的存储和搜索开销随着用户数量的增加而增加,提出了一种公平有效的假名管理模型。模型由假名证书发行、应用和协同追踪组成;采用新的部分盲签名协议确保CA参与假名证书发行,但无权追踪;采用秘密共享机制确保追踪机构必须协同才可揭露假名。由于实现了发行和追踪的分离且追踪机构无需存储、搜索ID与秘密的关联,因此所提模型有效地解决了上述问题。分析表明,模型具有匿名性、可追踪性、不可伪造性、健壮性、公平性,可应用于有匿名追踪需求的Internet安全通信,且能够与传统的PKI应用较好地衔接。

关键词: 匿名,假名管理,部分盲签名,协同追踪

Abstract: Anonymity is an effective approach to achieve privacy protection.Due to the illegal operation of a malicious user,anonymity requires to be disclosed in some applications.However there are two problems in the existing traceable anonymous schemes.The first one is that the rights of the administrator are too large.Secondly the overhead of storage and search for the relation between ID and a secret increases as the number of users increases.The paper proposed an efficient fair pseudonym management model.The model is composed of pseudonym issuance,pseudonymous application and joint tracking.The new partially blind signature protocol was given to ensure that CA takes part in pseudonym is-suance,however,it is unable to track.A secret sharing method was proposed to ensure that tracking authorities jointly disclose a pseudonym.The above two problems are solved effectively by the separation of issuance and tracking without storage and search for the relation between ID and secret.The analysis shows the model has the characteristic of anonymity,traceability,unforgeability,robustness and fairness.So it can be applied in anonymous communication with tracking requirements in Internet.Moreover,it can link up with traditional PKI technique well.

Key words: Anonymity,Pseudonymous management,Partially blind signature,Joint tracking

[1] 朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18
[2] 彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85
[3] 于爱民,初晓博,冯登国.基于可信芯片的终端平台匿名身份建立方法研究[J].计算机学报,2010,33(9):1703-1712
[4] 吴振强,周彦伟,乔子芮.一种可控可信的匿名通信方案[J].计算机学报,2010,33(9):1686-1702
[5] Boneh D,Boyen X,Shacham H.Short group signatures[C]∥Proceedings of Crypto’04.Springer Berlin Heidelberg,2004:41-55
[6] Sun Xiao-ting,Ho Pin-han,Shen Xue-min.GSIS:Secure vehicular communications with privacy preserving [J].IEEE Transactions on vehicular technology,2007,56(6):3442-3456
[7] 田子健,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740
[8] 李梦东,杨义先.无可信第三方的离线电子现金匿名性控制[J].电子学报,2005,33(3):456-458
[9] Cao Tian-jie,Lin Dong-dai,Xue Rui.A randomized RSA-based partially blind signature scheme for electronic cash[J].Compu-ters & Security,2005,24(1):44-49
[10] 曹珍富,朱浩瑾,陆荣幸.可证安全的强壮门限部分盲签名[J].中国科学E辑信息科学,2005,5(12):1254-1265
[11] 冯涛,彭伟,马建峰.安全的无可信PKG的部分盲签名方案[J].通信学报,2010,31(1):12-18
[12] Housley R,Ford W,Polk W,et al.Internet X.509Public Key Infrastructure Certificate and CRL Profile[EB/OL].http://www.ietf.org/rfc/rfc2459.txt,2012-03
[13] Shamir A.How to share a secret[J].Communications of theACM,1989,22(11):612-613

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!