期刊文献+

无随机预言的完全匿名多服务订购系统 被引量:1

Fully anonymous multi-service subscription system without random oracles
在线阅读 下载PDF
导出
摘要 最近,Canard等(CANARD S,JAMBERT A.Untraceability and profiling are not mutually exclusive[C]//TrustBus 2010:Proceedings of the 7th International Conference on Trust,Privacy and Security in Digital Business,LNCS6264.Berlin:Springer-Verlag,2010:117-128)提出了多服务订购的概念以及几个实例化的系统。然而,这些系统仅满足较弱的可撤销的匿名性且不适合于"按次付费"的服务。为此,通过对Canard等的系统进行扩展而提出一个改进的多服务订购系统。新系统利用Liu等(LIU J K,AU M H,SUSILO W,et al.Enhancing location privacy for electricvehicles(at the right time)[EB/OL].[2012-08-01].http://eprint.iacr.org/2012/342)的匿名支付技术实现了对"按次付费"的支持,利用Peng-Bao小区间证明技术实现了对"账户余额足以为当前服务付费"的零知识证明。此外,通过将Cramer等的技术应用于底层∑协议,实现了新系统的构造过程所需的完全零知识的知识证明协议。相对于已有的典型系统,新系统的优势体现在安全性方面:首先,在标准模型下满足可证安全;其次,实现了3个关键性质的最强安全等级,即支付令牌的不可分割性、用户的匿名性和底层证明系统的零知识性。 Lately, Canard et al. (CANARD S, JAMBERT A. Untraceability and profiling are not mutually exclusive [ C] // TrustBus 2010: Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business, LNCS 6264. Bedim Springer-Verlag, 2010:117 - 128) introduced the notion of multi-service subscription and proposed several instantiations. Unfortunately, their systems only satisfied a weaker variant of anonymity called revocable-anonymity and they were not fit for "pay-per-use" services. To this end, a revised multi-service subscription system was put forward to extending Canard et al's system. The new system achieved pay-per-use subscriptions by incorporating the anonymous payment system raised by Liu et al. (LIU J K, AU M H, SUSILO W, et al. Enhancing location privacy for electric vehicles (at the fight time) [ EB/OL]. [ 2012 -08 -01]. http://eprint, iacr. org/2012/342). To allow users to prove in zero-knowledge that their account balance is enough for making a payment for the required access, it also utilized the Peng-Bao range proof for small ranges. Furthermore, it was constructed on several 4-round perfect zero-knowledge proofs of knowledge, which were obtained by applying a technique by Cramer et al. to the underlying Sigma-protocols. Compared with typical systems in the literature, the new solution gains advantages in terms of security. Concretely, it can be proved secure in the standard model. Moreover, it matches the strongest level of three crucial security notions, such as inseparability for spendable tokens, anonymity for users, and zero-knowledge for underlying proof systems.
作者 柳欣 雷文庆
出处 《计算机应用》 CSCD 北大核心 2013年第2期417-422,429,共7页 journal of Computer Applications
基金 山东省高等学校科技计划项目(J11LG29)
关键词 电子商务 增强隐私保护的机制 匿名访问 知识证明 标准模型 e-commerce privacy-enhancing mechanism anonymous access knowledge proof standard model
  • 相关文献

参考文献15

  • 1CANARD S,JAMBERT A. Untraceability and profiling are not mutually exclusive[A].Beilin:Springer-Verlag,2010.117-128.
  • 2FUJII A,OHTAKE G,HANAOKA G. Anonymous authentication scheme for subscription services[A].Beilin:Springer-Verlag,2007.975-983.
  • 3BLANTON M. Online subscriptions with anonymous access[A].New York:ACM,2008.217-227.
  • 4柳欣,徐秋亮.实用的匿名订购协议[J].计算机工程与应用,2009,45(4):93-97. 被引量:3
  • 5VASCO M I G,HEIDARVAND S,VILLAR J L. Flexible anonymous subscription schemes[J].Communications in Computer and Information Science,2012,(05):203-219.
  • 6柳欣.满足增强安全性的匿名订购系统[J].计算机工程与应用,2012,48(17):16-22. 被引量:1
  • 7TSANG P P,AU M H,LIU J K. A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity[A].Berlin:springer-verlag,2010.166-183.
  • 8HENRY R,OLUMOFIN F,GOLDBERG I. Practical PIR for electronic commerce[A].New York:ACM,2011.677-690.
  • 9贾小英,李宝,刘亚敏.随机谕言模型[J].软件学报,2012,23(1):140-151. 被引量:5
  • 10LIU J K,AU M H,SUSILO W. Enhancing location privacy for electric vehicles (at the right time)[EB/OL].http://eprint.iacr.org/2012/342,2012.

二级参考文献72

  • 1Chen L,Enzmann M,Sadeghi A R,et al.A privacy-protecting coupon system [C]//Patrick A S,Yuug M.LNCS 3570:Financial Cryptography and Data Security,9th International Conference FC 2005,Roseau, The Commonwealth of Dominica,February 28-March 3,2005.Berlin: Springer-Vedag, 2005 : 93-108.
  • 2Canard S,Gouget A,Hufschmitt E.A handy multi-coupon system[C]// Zhou J,Yung M,Bao F.LNCS 3989:Applied Cryptography and Network Security,ACNS 2006,Signapore,June 6-9,2006.Berlin:Springer- Verlag, 2006: 66-81.
  • 3Ramzan Z,Ruhl M.Anonymous subscription protocols[Z/OL].[2000]. http ://citeseer.nj.nec.com/ ramzan00anonymous.html.
  • 4Camenisch J,Groth J.Group signatures:Better efficiency and new theoretical aspects[C]//Blundo C,Cimato S.LNCS 3352:Security in Communication Networks,4th International Conference,SCN 2004, Amalfi, Italy, September 8-10,2004.Berlin : Springer-Verlag, 2005 : 120-133.
  • 5Isshiki T,Mori K,Sako K,et al.Using group signatures for identity management and its implementation[C]//Goto A.Proceedings of the Second ACM Workshop on Digital Identity Management,DIM 2006, Alexandria, Virginia, USA, November, 2006.[S.l.] : ACM Press, 2006 : 73-78.
  • 6Camenisch J,Lysyanskaya A.A signature scheme with efficient protocols[C]//Cimato S,Galdi C,Persiano G.LNCS 2576:Security in Communication Networks,SCN 2002,Amalfi,Italy,September 11- 13,2002.Berlin: Springer-Verlag, 2002: 268-289.
  • 7Abdalla M,An J,Bellare M,et al.From identification to signatures via the Fiat-Shamir transform:Minimizing assumptions for security and forward-seeurity[C]//Knudsen L R.LNCS 2332:Advances in Cryptology-EUROCRYPT 2002,Amsterdam,Netherlands,April 28- May 2,2002.Berlin : Springer-Verlag, 2002: 418-433.
  • 8Camenisch J,Shoup V.Practical verifiable encryption and decryption of discrete logurithms[C]//Boneh D.LNCS 2729:Advances in Cryptology-CRYPTO 2003,Santa Barbara,California,USA,August 17-21,2003.Berlin: Springer-Verlag, 2003:126-144.
  • 9Goldreieh O,Rosen V.On the security of modular exponentiation with application to the construction of pseudorandom generators[J]. Journal of Cryptology,2003,16(2) :71-93.
  • 10Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In: Denning DE, Pyle R, Ganesan R, Sandhu RS, Ashby V, eds. Proc. of the 1 st ACM Conf. on Computer and Communications Security. New York: ACM Press, 1993.62-67. [doi: 10.1145/168588.168596].

共引文献6

同被引文献25

  • 1MAURER U.Unifying zero-knowledge proofs of knowledge. Proceedings of AFRICACRYPT 2009 . 2009
  • 2LYSYANSKAYA A.Threshold cryptography secure against the adaptive adversary,concurrently. http://eprint.iacr.org/2000/019.pdf . 2000
  • 3YANG Yanjiang,DING Xuhua,LU Haibing,et al.Self-blindable credential:towards lightweight anonymous entity authentication. https://eprint.iacr.org/ 2013 /207.pdf . 2013
  • 4Au M H,Liu J K,Fang J,et al.A new payment system for enhancing location privacy of electric vehicles. IEEE Transactions on Vehicular Technology . 2014
  • 5Vasco M I G,Heidarvand S,Villar J L.Anonymous subscription schemes-a flexible construction for on-line services access. Proceedings of SECRYPT2010 . 2010
  • 6SENEVIRATNE J,PARAMPALLI U,KULIK L.An authorised pseudonym system for privacy preserving location proof architectures. Proceedings of AISC 2014 . 2014
  • 7Au M H,Susilo W,Mu Y,et al.Constant-size dynamic k-times anonymous authentication. IEEE Systems Journal . 2013
  • 8KIAYIAS A,XU S,YUNG M.Privacy preserving data mining within anonymous credential systems. Proceedings of SCN 2008 . 2008
  • 9CANARD S,COISEL I,JAMBERT A,et al.New results for the practical use of range proofs. Proceedings of Euro P-KI 2013 . 2014
  • 10Rosario Gennaro,Stanislaw Jarecki,Hugo Krawczyk,Tal Rabin.??Secure Distributed Key Generation for Discrete-Log Based Cryptosystems(J)Journal of Cryptology . 2007 (1)

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部