首页 | 本学科首页   官方微博 | 高级检索  
     

基于双线性对的隐藏签名认证方案
引用本文:王尚平, 杨春霞, 王晓峰, 张亚玲. 基于双线性对的隐藏签名认证方案[J]. 电子与信息学报, 2008, 30(2): 486-489. doi: 10.3724/SP.J.1146.2006.00948
作者姓名:王尚平  杨春霞  王晓峰  张亚玲
作者单位:西安理工大学密码理论与网络安全研究室,西安,710048;西安理工大学密码理论与网络安全研究室,西安,710048;西安理工大学密码理论与网络安全研究室,西安,710048;西安理工大学密码理论与网络安全研究室,西安,710048
基金项目:国家自然科学基金 , 陕西省教育厅资助项目 , 陕西省自然科学基金
摘    要:隐藏签名认证方案是指,当用户从CA得到签名(证书)后,在向服务提供商申请服务时,为防止攻击者截获签名或串通服务提供商来陷害自己,用户向服务提供商证明他(或她)有签名而不把该签名给服务提供商。现有的隐藏签名认证方案都不能阻止CA冒充用户身份。该文引入两个证书权威机构CA,假设两个CA不勾结,提出了3个隐藏签名认证方案。这3个方案都能保护用户身份不被任何人(包括CA)冒充;在用户端具备较强计算能力时,后两个方案实现了用户和服务提供商的双向认证;并且在CA具有一定可信度时,第3个方案还能部分抵抗拒绝服务攻击(DoS)。

关 键 词:隐藏签名的认证   数字签名   CA   DoS
文章编号:1009-5896(2008)02-0486-04
收稿时间:2006-06-29
修稿时间:2007-01-15

New Signature-Masked Authentication Schemes from the Bilinear Pairings
Wang Shang-ping, Yang Chun-xia, Wang Xiao-feng, Zhang Ya-ling. New Signature-Masked Authentication Schemes from the Bilinear Pairings[J]. Journal of Electronics & Information Technology, 2008, 30(2): 486-489. doi: 10.3724/SP.J.1146.2006.00948
Authors:Wang Shang-ping  Yang Chun-xia  Wang Xiao-feng  Zhang Ya-ling
Affiliation:Lab. of Cryptography and Network Security, Xi’an Univ. of Tech., Xi’an 710048, China
Abstract:Signature-masked authentication scheme means:when a user obtains a signature(certificate)from CA, in order to get service from a service provider and to prevent any adversary from intercepting the signature or colluding with the service provider to frame him(or her),the user is intent on proving that he(or she)really owns the signature but not transmits it to the service provider directly.Considering previous schemes can not prevent CA from impersonating legitimate users,two different CAs are introduced in this paper,and under the assumption that these two CAs do not collude,three signature-masked authentication schemes are given which guarantee that anyone including CA can not impersonate the legitimate user to get service from the provider.The first scheme is a simple scheme of unilateral authentication.Moreover,under the assumption that the user has enough computation power,mutual authentication between the user and the provider is realized in the last two schemes. Furthermore considering the first two schemes above are vulnerable to denial of service(DoS)attack,under the assumption that CA is of certain reliability,the third scheme which can also partially realize the resistance to DoS attack is proposed.
Keywords:Signature-masked authentication   Digital signature   CA   DoS
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号