首页 | 本学科首页   官方微博 | 高级检索  
     检索      


An anonymous authentication scheme withstanding the conspiracy attack
Authors:Fengmei Yin  Guangning Pu
Institution:1.Department of Public Computer Teaching,Hefei Normal University,Hefei 230601, Anhui,China;2.Xueyan Trade Faculty,Anhui Finance and Trade Vocational College,Hefei 230601, Anhui,China
Abstract:A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.
Keywords:
本文献已被 CNKI SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号