Computer Science ›› 2013, Vol. 40 ›› Issue (11): 122-125.

Previous Articles     Next Articles

Efficient Fair Pseudonym Management Model

ZHU Xiao-ling,LU Yang,ZHANG Ben-hong and HOU Zheng-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Anonymity is an effective approach to achieve privacy protection.Due to the illegal operation of a malicious user,anonymity requires to be disclosed in some applications.However there are two problems in the existing traceable anonymous schemes.The first one is that the rights of the administrator are too large.Secondly the overhead of storage and search for the relation between ID and a secret increases as the number of users increases.The paper proposed an efficient fair pseudonym management model.The model is composed of pseudonym issuance,pseudonymous application and joint tracking.The new partially blind signature protocol was given to ensure that CA takes part in pseudonym is-suance,however,it is unable to track.A secret sharing method was proposed to ensure that tracking authorities jointly disclose a pseudonym.The above two problems are solved effectively by the separation of issuance and tracking without storage and search for the relation between ID and secret.The analysis shows the model has the characteristic of anonymity,traceability,unforgeability,robustness and fairness.So it can be applied in anonymous communication with tracking requirements in Internet.Moreover,it can link up with traditional PKI technique well.

Key words: Anonymity,Pseudonymous management,Partially blind signature,Joint tracking

[1] 朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18
[2] 彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85
[3] 于爱民,初晓博,冯登国.基于可信芯片的终端平台匿名身份建立方法研究[J].计算机学报,2010,33(9):1703-1712
[4] 吴振强,周彦伟,乔子芮.一种可控可信的匿名通信方案[J].计算机学报,2010,33(9):1686-1702
[5] Boneh D,Boyen X,Shacham H.Short group signatures[C]∥Proceedings of Crypto’04.Springer Berlin Heidelberg,2004:41-55
[6] Sun Xiao-ting,Ho Pin-han,Shen Xue-min.GSIS:Secure vehicular communications with privacy preserving [J].IEEE Transactions on vehicular technology,2007,56(6):3442-3456
[7] 田子健,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740
[8] 李梦东,杨义先.无可信第三方的离线电子现金匿名性控制[J].电子学报,2005,33(3):456-458
[9] Cao Tian-jie,Lin Dong-dai,Xue Rui.A randomized RSA-based partially blind signature scheme for electronic cash[J].Compu-ters & Security,2005,24(1):44-49
[10] 曹珍富,朱浩瑾,陆荣幸.可证安全的强壮门限部分盲签名[J].中国科学E辑信息科学,2005,5(12):1254-1265
[11] 冯涛,彭伟,马建峰.安全的无可信PKG的部分盲签名方案[J].通信学报,2010,31(1):12-18
[12] Housley R,Ford W,Polk W,et al.Internet X.509Public Key Infrastructure Certificate and CRL Profile[EB/OL].http://www.ietf.org/rfc/rfc2459.txt,2012-03
[13] Shamir A.How to share a secret[J].Communications of theACM,1989,22(11):612-613

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!