An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability
نویسندگان
چکیده
In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous is divided into unconditional and traceable Unconditional can verify that user belongs an set, but true identity cannot be obtained. However, in some applications, it necessary trace of user. Therefore, a scheme proposed. prevent random tracing, proposed uses threshold joint tracing. When authenticator needs traced, number members jointly authenticator. special network applications such as electronic voting, repeated authentications elections, whether two signatures are signed by same without revealing should have selective linkability. achieve linkable authentication, tag embedded ring signature. Compared with similar schemes through simulation experiments, implementation time slightly better than other schemes.
منابع مشابه
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However, his identity cannot be revealed and linked to other pseudonyms unless solving the computational Diffie-Hellman problem. In the second variant a set R of revocation centers is able to revoke the anonymity in collabora...
متن کاملAn efficient and secure anonymous mobility network authentication scheme
The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...
متن کاملAn Anonymous Authentication Scheme for Trusted Computing Platform
The Trusted Computing Platform is the industrial initiative to implement computer security. However, privacy protection is a critical problem that must be solved in Trusted Computing Platform. In this paper, we propose a simple and efficient method to implement anonymous authentication in such setting. The new scheme is proved to be secure under the strong RSA assumption and decisional Diffie-H...
متن کاملAn improved anonymous authentication scheme for roaming in ubiquitous networks
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ...
متن کاملAn Improved Anonymous Authentication Scheme for Roaming Services
In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wuhan University Journal of Natural Sciences
سال: 2023
ISSN: ['1007-1202', '1993-4998']
DOI: https://doi.org/10.1051/wujns/2023284317