计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 197-199.

• 信息安全 • 上一篇    下一篇

基于零知识证明的匿名身份认证机制

李琳,岳建华   

  1. 中国矿业大学计算机科学与技术学院 徐州221116;中国矿业大学资源与地球科学学院 徐州221116
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受“十二五”国家科技支撑计划资助

Anonymous Authentication Mechanisms Based on Zero-knowledge Proof

LI Lin and YUE Jian-hua   

  • Online:2018-11-16 Published:2018-11-16

摘要: 近年来,随着互联网的快速发展,匿名身份认证对保护用户的隐私和信息安全发挥着越来越重要的作用。对现有身份认证机制进行了分析,指出其存在的缺点,并在此基础上,提出了改进方法,给出了基于Wang 的使用数字签名的零知识证明的匿名身份认证方案。该方案既降低了通信流量,又具有更高级别的安全性。

关键词: 匿名,身份认证,数字签名,零知识证明

Abstract: With the rapid development of Internet,anonymous authentication plays more and more important roles during the users’ privacy protection and information security.Based on the analysis of existed authentication scheme,this paper pointed out the existing shortcomings and proposed the improved one.In addition,the paper gave the zero-know-ledge proof of the scheme with digital signatures proposed by Wang.The proposed scheme greatly reduces the traffic and increases the security.

Key words: Anonymous,Authentication,Digital signature,Zero-knowledge proof

[1] Lee W B,Chang C C.The protocols guarantee user anonymity indistributed network user authentication and key distribution[J].Computer Systems Science and Engineering,1999,15(4):113-116
[2] Wu T S,Hsu C L.Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks[J].Computers and Security,2004,23(2):120-125
[3] Viet D Q,Yamamura A,Tanaka H.Anonymous authenticated key exchange protocol based on password:Advances in Cryptology INDOCRYPT,2005[C]∥LNCS,Vol.3797.Berlin:Spring-Verlag,2005:244-257
[4] Yang Jing,Zhang Zhen-feng.New anonymous password-basedauthenticated key exchange protocol [C]∥Chowdhury D R,Rijmen V,Das A,eds.INDOCRYPT,2008.LNCS 5365,8:200-212
[5] Cui Hui,Cao Tian-jie.A new anonymous identity authentication and key exchange protocols[J].Journal of Network,2003,4(10):985-992
[6] Bo Z,Wan Z G,et al.Anonymous secure routing for mobile ad hoc networks[C]∥29th Annual IEEE International Conference,2004.2004:102-108
[7] Chien H Y,Chen C H.Remote authentication mechanism ofguarantee user anonymity[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications-AINA,2005.2005:245-248
[8] Durresi A.Anonymous communications in the Internet[J].Cluster Computing,2007,0(1):57-66
[9] 王尚平,王育民,王晓峰,等.DSA数字签名的零知识证明[J].电子学报,2004,32(5):878-880
[10] Cesena E,Lhr H,Ramunno G,et al.Anonymous authentication with TLS and DAA[C]∥Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST’10),2008.LNCS,vol.6101,2008:47-62
[11] Chen L,Page D,et al.On the design and implementation of an efficient DAA scheme[C]∥9th IFIP WG 8.8/11.2InternationalConference on Smart Card Research and Advanced Application (CARDIS’10),2010.LNCS,vol.6035,2010:223-237

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!