Computer Science ›› 2013, Vol. 40 ›› Issue (12): 197-199.

Previous Articles     Next Articles

Anonymous Authentication Mechanisms Based on Zero-knowledge Proof

LI Lin and YUE Jian-hua   

  • Online:2018-11-16 Published:2018-11-16

Abstract: With the rapid development of Internet,anonymous authentication plays more and more important roles during the users’ privacy protection and information security.Based on the analysis of existed authentication scheme,this paper pointed out the existing shortcomings and proposed the improved one.In addition,the paper gave the zero-know-ledge proof of the scheme with digital signatures proposed by Wang.The proposed scheme greatly reduces the traffic and increases the security.

Key words: Anonymous,Authentication,Digital signature,Zero-knowledge proof

[1] Lee W B,Chang C C.The protocols guarantee user anonymity indistributed network user authentication and key distribution[J].Computer Systems Science and Engineering,1999,15(4):113-116
[2] Wu T S,Hsu C L.Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks[J].Computers and Security,2004,23(2):120-125
[3] Viet D Q,Yamamura A,Tanaka H.Anonymous authenticated key exchange protocol based on password:Advances in Cryptology INDOCRYPT,2005[C]∥LNCS,Vol.3797.Berlin:Spring-Verlag,2005:244-257
[4] Yang Jing,Zhang Zhen-feng.New anonymous password-basedauthenticated key exchange protocol [C]∥Chowdhury D R,Rijmen V,Das A,eds.INDOCRYPT,2008.LNCS 5365,8:200-212
[5] Cui Hui,Cao Tian-jie.A new anonymous identity authentication and key exchange protocols[J].Journal of Network,2003,4(10):985-992
[6] Bo Z,Wan Z G,et al.Anonymous secure routing for mobile ad hoc networks[C]∥29th Annual IEEE International Conference,2004.2004:102-108
[7] Chien H Y,Chen C H.Remote authentication mechanism ofguarantee user anonymity[C]∥Proceedings of the 19th International Conference on Advanced Information Networking and Applications-AINA,2005.2005:245-248
[8] Durresi A.Anonymous communications in the Internet[J].Cluster Computing,2007,0(1):57-66
[9] 王尚平,王育民,王晓峰,等.DSA数字签名的零知识证明[J].电子学报,2004,32(5):878-880
[10] Cesena E,Lhr H,Ramunno G,et al.Anonymous authentication with TLS and DAA[C]∥Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST’10),2008.LNCS,vol.6101,2008:47-62
[11] Chen L,Page D,et al.On the design and implementation of an efficient DAA scheme[C]∥9th IFIP WG 8.8/11.2InternationalConference on Smart Card Research and Advanced Application (CARDIS’10),2010.LNCS,vol.6035,2010:223-237

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!