An anonymous authentication scheme withstanding the conspiracy attack |
| |
Authors: | Fengmei Yin Guangning Pu |
| |
Institution: | 1.Department of Public Computer Teaching,Hefei Normal University,Hefei 230601, Anhui,China;2.Xueyan Trade Faculty,Anhui Finance and Trade Vocational College,Hefei 230601, Anhui,China |
| |
Abstract: | A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on. |
| |
Keywords: | |
本文献已被 CNKI SpringerLink 等数据库收录! |
|