期刊文献+

实用的匿名订购协议 被引量:3

Practical anonymous subscription protocol
在线阅读 下载PDF
导出
摘要 匿名订购协议是一类用于保护订购者隐私的密码机制。基于匿名令牌的思想提出一个安全实用的匿名订购协议。新协议的设计借鉴了Camenisch-Groth群签名以及Camenisch-Lysyanskaya签名等技术。另外,为了实现匿名令牌的分发,对一个已有的用于对被承诺值签名的协议进行了扩展。在随机预言模型下,可以证明新协议满足了实用匿名订购协议所要求的全部特性,即匿名性、无关联性、不可伪造性、抵抗联合攻击等。 Anonymous subscription protocols are cryptographic techniques for protecting subscribers' privacy.In this paper,a practical and secure anonymous subscription protocol is put forward,which is motivated by the idea of anonymous tokens.The main construction of the new protocol is based on several building blocks,i.e.,the Camenisch-Groth group signature scheme,the Camenisch-Lysyanskaya signature scheme,etc.In addition,to distribute anonymous tokens,a well-known protocol for signing a committed value is extended.In the random oracle model,it can be proved that the new protocol fulfills all the characteristics that anonymous subscription protocols should satisfy in order to be interesting or useful in practice,i.e.,anonymity,unlinkablility,unforgeability,coalition-resistance,etc.
作者 柳欣 徐秋亮
出处 《计算机工程与应用》 CSCD 北大核心 2009年第4期93-97,共5页 Computer Engineering and Applications
基金 山东省教育厅科技计划项目No.J07WJ21~~
关键词 电子商务 匿名订购协议 数字签名 群签名 匿名性 E-commerce anonymous subscription protocols digital signatures group signatures anonymity
  • 相关文献

参考文献9

  • 1Chen L,Enzmann M,Sadeghi A R,et al.A privacy-protecting coupon system [C]//Patrick A S,Yuug M.LNCS 3570:Financial Cryptography and Data Security,9th International Conference FC 2005,Roseau, The Commonwealth of Dominica,February 28-March 3,2005.Berlin: Springer-Vedag, 2005 : 93-108.
  • 2Canard S,Gouget A,Hufschmitt E.A handy multi-coupon system[C]// Zhou J,Yung M,Bao F.LNCS 3989:Applied Cryptography and Network Security,ACNS 2006,Signapore,June 6-9,2006.Berlin:Springer- Verlag, 2006: 66-81.
  • 3Ramzan Z,Ruhl M.Anonymous subscription protocols[Z/OL].[2000]. http ://citeseer.nj.nec.com/ ramzan00anonymous.html.
  • 4Camenisch J,Groth J.Group signatures:Better efficiency and new theoretical aspects[C]//Blundo C,Cimato S.LNCS 3352:Security in Communication Networks,4th International Conference,SCN 2004, Amalfi, Italy, September 8-10,2004.Berlin : Springer-Verlag, 2005 : 120-133.
  • 5Isshiki T,Mori K,Sako K,et al.Using group signatures for identity management and its implementation[C]//Goto A.Proceedings of the Second ACM Workshop on Digital Identity Management,DIM 2006, Alexandria, Virginia, USA, November, 2006.[S.l.] : ACM Press, 2006 : 73-78.
  • 6Camenisch J,Lysyanskaya A.A signature scheme with efficient protocols[C]//Cimato S,Galdi C,Persiano G.LNCS 2576:Security in Communication Networks,SCN 2002,Amalfi,Italy,September 11- 13,2002.Berlin: Springer-Verlag, 2002: 268-289.
  • 7Abdalla M,An J,Bellare M,et al.From identification to signatures via the Fiat-Shamir transform:Minimizing assumptions for security and forward-seeurity[C]//Knudsen L R.LNCS 2332:Advances in Cryptology-EUROCRYPT 2002,Amsterdam,Netherlands,April 28- May 2,2002.Berlin : Springer-Verlag, 2002: 418-433.
  • 8Camenisch J,Shoup V.Practical verifiable encryption and decryption of discrete logurithms[C]//Boneh D.LNCS 2729:Advances in Cryptology-CRYPTO 2003,Santa Barbara,California,USA,August 17-21,2003.Berlin: Springer-Verlag, 2003:126-144.
  • 9Goldreieh O,Rosen V.On the security of modular exponentiation with application to the construction of pseudorandom generators[J]. Journal of Cryptology,2003,16(2) :71-93.

同被引文献55

  • 1Camenisch J, Dubovitskaya M, Neven G.Unlinkable priced oblivious transfer with rechargeable wallets[C]//Proceedings of FC 2010.Berlin: Springer-Verlag, 2010: 66-81.
  • 2Fujii A, Ohtake G, Hanaoka G, et al.Anonymous authentication scheme for subscription services[C]//Proceedings of KES 2007/WIRN 2007.Berlin: Springer-Verlag, 2007: 975-983.
  • 3Blanton M.Online subscriptions with anonymous access[C]// Proceedings of ASIA-CCS 2008.NewYork: ACM Press, 2008 : 217-227.
  • 4Canard S, Jambert A.Untraceability and profiling are not mutually exclusive[C]//Proceedings of TrustBus 2010. Berlin: Springer-Verlag, 2010:117-128.
  • 5Ramzan Z, Ruhl M.Protocols for anonymous subscription services[EB/OL]. (2000-11-01).[2012-01-10].http://people. csail.mit.edu/ruhl/papers/.
  • 6Vasco M I G, Heidarvand S, Villar J L.Anonymous subscription schemes-a flexible construction for on-line services access[C]//Proceedings of SECRYPT 2010.New York:IEEE Press,2010: 120-131.
  • 7Slamanig D.Efficient schemes for anonymous yet authorized and bounded use of cloud resources[C]//Proceedings of SAC 2011.Berlin: Springer-Verlag, 2011 : 73-91.
  • 8Camenisch J, Kiayias A, Yung M.On the portability of generalized Schnorr proofs[C]//Proceedings of EUROCRYPT 2009.Berlin: Springer-Verlag, 2009 : 425-442.
  • 9Zhao Yunlei,Deng R H, Zang Binyu, et al.Practical zeroknowledge arguments from E-protocols[C]//Proceedings of WINE 2005.Berlin: Springer-Verlag, 2005 : 288-298.
  • 10Au M H, Susilo W, Yiu S M.Event-oriented k-times revocable-iff-linked group signatures [C]//Proceedings of ACISP 2006.Berlin: Springer-Verlag, 2006: 223-234.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部