In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authenticati...In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes.展开更多
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel...Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.展开更多
To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achie...To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achieve public linking and tracing while holding access control,therefore,a new tool named linkable and traceable anonymous authentication with fine-grained access control(LTAA-FGAC)is offered,which is designed to satisfy:(i)access control,i.e.,only authorized users who meet a designated authentication policy are approved to authenticate messages;(ii)public linkability,i.e.,anyone can tell whether two authentications with respect to a common identifier are created by an identical user;(iii)public traceability,i.e.,everyone has the ability to deduce a double-authentication user’s identity from two linked authentications without the help of other parties.We formally define the basic security requirements for the new tool,and also give a generic construction so as to satisfy these requirements.Then,we present a formal security proof and an implementation of our proposed LTAA-FGAC scheme.展开更多
基金Supported by the Key Natural Science Foundation of Anhui Higher Education Institutions(2022AH052536)。
文摘In order to protect the user's privacy identity,authentication requires anonymous authentication.Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication.Unconditional anonymous authentication can verify that the user belongs to an anonymous set,but the user's true identity cannot be obtained.However,in some applications,it is necessary to trace the true identity of the user.Therefore,a traceable anonymous authentication scheme is proposed.In order to prevent random tracing,the proposed scheme uses threshold joint tracing.When the identity of the authenticator needs to be traced,the threshold number of members can jointly trace the identity of the authenticator.In some special network applications such as anonymous electronic voting,in order to prevent repeated authentications and repeated elections,it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user.Therefore,the proposed anonymous authentication scheme should have selective linkability.In order to achieve linkable authentication,the linkable tag is embedded by linkable ring signature.Compared with similar schemes through the simulation experiments,the implementation time of the proposed scheme is slightly better than other schemes.
基金the National Natural Science Foundation of China (Nos. 60703031, 60703004, 60673076)
文摘Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.
基金supported by the National Natural Science Foundation of China(Grant Nos.U2001205,61932010)Guangdong Basic and Applied Basic Research Foundation(Nos.2023B1515040020,2019B030302008)Guangdong Provincial Key Laboratory of Power System Network Security(No.GPKLPSNS-2022-KF-05).
文摘To prevent misuse of privacy,numerous anonymous authentication schemes with linkability and/or traceability have been proposed to ensure different types of accountabilities.Previous schemes cannot simultaneously achieve public linking and tracing while holding access control,therefore,a new tool named linkable and traceable anonymous authentication with fine-grained access control(LTAA-FGAC)is offered,which is designed to satisfy:(i)access control,i.e.,only authorized users who meet a designated authentication policy are approved to authenticate messages;(ii)public linkability,i.e.,anyone can tell whether two authentications with respect to a common identifier are created by an identical user;(iii)public traceability,i.e.,everyone has the ability to deduce a double-authentication user’s identity from two linked authentications without the help of other parties.We formally define the basic security requirements for the new tool,and also give a generic construction so as to satisfy these requirements.Then,we present a formal security proof and an implementation of our proposed LTAA-FGAC scheme.