计算机科学 ›› 2013, Vol. 40 ›› Issue (12): 197-199.
李琳,岳建华
LI Lin and YUE Jian-hua
摘要: 近年来,随着互联网的快速发展,匿名身份认证对保护用户的隐私和信息安全发挥着越来越重要的作用。对现有身份认证机制进行了分析,指出其存在的缺点,并在此基础上,提出了改进方法,给出了基于Wang 的使用数字签名的零知识证明的匿名身份认证方案。该方案既降低了通信流量,又具有更高级别的安全性。
[1] Lee W B,Chang C C.The protocols guarantee user anonymity indistributed network user authentication and key distribution[J].Computer Systems Science and Engineering,1999,15(4):113-116 [2] Wu T S,Hsu C L.Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks[J].Computers and Security,2004,23(2):120-125 [3] Viet D Q,Yamamura A,Tanaka H.Anonymous authenticated key exchange protocol based on password:Advances in Cryptology INDOCRYPT,2005[C]∥LNCS,Vol.3797.Berlin:Spring-Verlag,2005:244-257 [4] Yang Jing,Zhang Zhen-feng.New anonymous password-basedauthenticated key exchange protocol [C]∥Chowdhury D R,Rijmen V,Das A,eds.INDOCRYPT,2008.LNCS 5365,8:200-212 [5] Cui Hui,Cao Tian-jie.A new anonymous identity authentication and key exchange protocols[J].Journal of Network,2003,4(10):985-992 [6] Bo Z,Wan Z G,et al.Anonymous secure routing for mobile ad hoc networks[C]∥29th Annual IEEE International Conference,2004.2004:102-108 [7] Chien H Y,Chen C H.Remote authentication mechanism ofguarantee user anonymity[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications-AINA,2005.2005:245-248 [8] Durresi A.Anonymous communications in the Internet[J].Cluster Computing,2007,0(1):57-66 [9] 王尚平,王育民,王晓峰,等.DSA数字签名的零知识证明[J].电子学报,2004,32(5):878-880 [10] Cesena E,Lhr H,Ramunno G,et al.Anonymous authentication with TLS and DAA[C]∥Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST’10),2008.LNCS,vol.6101,2008:47-62 [11] Chen L,Page D,et al.On the design and implementation of an efficient DAA scheme[C]∥9th IFIP WG 8.8/11.2InternationalConference on Smart Card Research and Advanced Application (CARDIS’10),2010.LNCS,vol.6035,2010:223-237 |
No related articles found! |
|