首页 | 本学科首页   官方微博 | 高级检索  
     检索      

不可克隆的动态k次匿名认证方案
引用本文:柳 欣,徐秋亮.不可克隆的动态k次匿名认证方案[J].通信学报,2012,33(7):75-89.
作者姓名:柳 欣  徐秋亮
作者单位:1. 山东大学计算机科学与技术学院,山东济南250101;山东青年政治学院信息工程学院,山东济南250014;山东青年政治学院山东省高校信息安全与智能控制重点实验室,山东济南250103
2. 山东大学计算机科学与技术学院,山东济南,250101
基金项目:国家自然科学基金,山东省自然科学重点基金,教育部博士点基金
摘    要:在已有的k次匿名认证方案中,尚存在2个未解决问题:1)如何实现允许服务供应商为每个用户设置不同的访问次数上界,同时不能以损失用户的匿名性作为代价;2)如何防止恶意用户发动大规模的克隆攻击。为此提出一个改进方案。新方案的构造过程使用了多项关键技术,包括关于"一个被承诺元素小于另一个被承诺元素"的知识证明,动态累加器和基于n次可展示令牌的克隆攻击检测方法等。对Teranishi等人的安全性模型做出修改,并且证明新方案在该模型下满足可证安全。此外,新方案的成员注册协议是并发安全的,因而适合于在实际的异步网络环境(如互联网)下进行部署。

关 键 词:k次匿名认证  零知识证明  克隆攻击  协议  并发零知识

Unclonable dynamic k-times anonymous authentication
LIU Xin , XU Qiu-liang.Unclonable dynamic k-times anonymous authentication[J].Journal on Communications,2012,33(7):75-89.
Authors:LIU Xin  XU Qiu-liang
Institution:1(1.School of Computer Science and Technology,Shandong University,Ji’nan 250101,China;2.School of Information Engineering,Shandong Youth University of Political Science,Ji’nan 250014,China;3.Key Laboratory of Information Security and Intelligent Control in Universities of Shandong,Shandong Youth University of Political Science,Ji’nan 250103,China)
Abstract:In previous works of k-times anonymous authentication,two problems have not been properly solved: 1) how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2) how to protect against massive clone attacks mounted by malicious users.To overcome these obstacles,a revised scheme was proposed.It incorporated several crucial tools including the proof that a committed value is less than another committed value,dynamic accumulator,the method of cloning detection based on n-times show e-tokens,etc.The new scheme is proven secure in a new security model which was obtained by modifying the security model of Teranishi et al.Moreover,the registration protocol of the new scheme is concurrently-secure,so it is fit for the deployment in realistic asynchronous network setting(e.g.,Internet).
Keywords:k-times anonymous authentication  zero-knowledge proof  the cloning attack  Omega-protocol  concurrent zero-knowledge
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号