期刊文献+

可信第三方的伪名签名方案研究 被引量:1

Study on Pseudonym Signature Scheme of Trusted Third Party
在线阅读 下载PDF
导出
摘要 互联网中用户资料极易泄露,用户的匿名性和安全性问题亟待解决。伪名签名方案可以使用户在网络通信中保持匿名,但存在认证机构与域管理机构合谋泄露的风险和对违规用户响应慢的问题。针对该问题,提出了可信第三方参与的伪名签名方案。在该方案中,用户首先向认证机构申请允许使用某个伪名的许可证书,然后使用该许可证书向域管理机构申请该伪名的证书,并使用该伪名在域中构建伪名签名,最后通过追踪中心(可信第三方)快速检测可能存在违规操作的用户,由认证机构进行相应的处理。方案通过双重伪名更好地保证了用户的匿名性,降低了中央认证机构的运算成本,提高了系统的门限,并且在获取违规用户真实身份时具有快速响应能力,降低了系统因用户违规操作带来的潜在损失。 User data on the Internet are extremely easy to leak,and the anonymity and security issues of users need to be resolved.The pseudonym system can make users remain anonymous in network communication,but there are risks of collusion between authentication agencies and domain management agencies and a slow response to the offending user.Aiming at this problem,a pseudonym signature scheme involving trusted third parties is proposed in this paper.The user first applies to the certificate authority for a license permitting the use of a pseudonym,then uses the license to apply for the pseudonym certificate from the domain authority,and uses the pseudonym to construct a pseudonym signature in the domain.Finally,users with illegal operations are quickly detected by tracking center(trusted third party),and the certificate authority will handle the corresponding processing.The proposed scheme guarantees the anonymity of users better by using double pseudonyms,reduces the operation cost of the certificate authority,improves the threshold of the system,has fast response ability in acquiring the real identity of users who violate the rules,and reduces the potential loss of the system caused by users illegal operations.
作者 陈虹 陈红霖 黄洁 肖成龙 郭鹏飞 金海波 CHEN Hong;CHEN Honglin;HUANG Jie;XIAO Chenglong;GUO Pengfei;JIN Haibo(College of Software,Liaoning Technical University,Huludao,Liaoning 125105,China)
出处 《计算机科学与探索》 CSCD 北大核心 2020年第8期1327-1337,共11页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金No.61404069 辽宁省教育厅项目No.LJYL050 辽宁省教育厅科学技术研究项目No.LJ2017QL032 国家留学基金资助项目No.201808210401。
关键词 伪名签名 双重伪名 去匿名化 部分盲签名 pseudonymous signature double pseudonym de-anonymization partial blind signature
  • 相关文献

参考文献4

二级参考文献60

  • 1张学军,王育民.高效的基于身份的部分盲签名[J].计算机工程与应用,2007,43(11):211-212. 被引量:11
  • 2CHAUM D. Blind signatures for untraceable payments [ C ]//Proc of CRYPTO 1982. New York: Plenum Press, 1983 : 199-203.
  • 3ABE M, FUJISAKI E. How to date blind signatures [ C ]//Proc of ASIACRYPT 1996. Berlin : Springer-Verlag, 1996 : 244 - 251.
  • 4DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory, 1976,22 (6) : 644-654.
  • 5ABE M, OKAMOTO T. Provably secure partially blind signatures [C]//Proc of CRYPTO 2000. Berlin: Springer-Verlag, 2000: 271-286.
  • 6JUELS A, LUBY M, OSTROVSKY R. Security of blind digital signatures[ C ]//Proc of CRYPTO 1997. Berlin: Springer-Verlag, 1997 : 150-164.
  • 7WU Qian-hong, SUSILO W, MU Yi, et al. Efficient partially blind signatures with provable security [ C ]//Proc of International Conference on Computational Science and its Applications. Berlin: Springer-Verlag,2007 : 1096-1105.
  • 8CAO Tian-jie, LIN Dong-dai, XUI Rui. A randomized RSA-based partially blind signature scheme for electronic cash[ J]. Computers and Security,2005,24( 1 ) : 44-49.
  • 9MARTINET G, POUPARD G, SOLA P. Cryptanalysis of a partially blind signature scheme or how to make $100 bills with" $1 and $2 ones[C]//Proc of Financial Cryptography and Data Security. Berlin: Springer-Verlag,2006 : 171-176.
  • 10HUANG Hui-feng, CHANG C C. A new design of efficient partially blind signature scheme [ J ]. Journal of Systems and Software, 2004,73 ( 3 ) :397-403.

共引文献13

同被引文献15

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部