An Anonymous Authentication Scheme with Selective Linkability and Threshold Traceability

نویسندگان

چکیده

In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous is divided into unconditional and traceable Unconditional can verify that user belongs an set, but true identity cannot be obtained. However, in some applications, it necessary trace of user. Therefore, a scheme proposed. prevent random tracing, proposed uses threshold joint tracing. When authenticator needs traced, number members jointly authenticator. special network applications such as electronic voting, repeated authentications elections, whether two signatures are signed by same without revealing should have selective linkability. achieve linkable authentication, tag embedded ring signature. Compared with similar schemes through simulation experiments, implementation time slightly better than other schemes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability

In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However, his identity cannot be revealed and linked to other pseudonyms unless solving the computational Diffie-Hellman problem. In the second variant a set R of revocation centers is able to revoke the anonymity in collabora...

متن کامل

An efficient and secure anonymous mobility network authentication scheme

The demands of Internet users are steadily increasing. Many users access Internet services through mobile devices via wireless networks. To prevent disclosure of private data, researchers have proposed various anonymous roaming authentication schemes which apply different technologies to provide integral security properties, such as symmetric and asymmetric encryption, digital signature, timest...

متن کامل

An Anonymous Authentication Scheme for Trusted Computing Platform

The Trusted Computing Platform is the industrial initiative to implement computer security. However, privacy protection is a critical problem that must be solved in Trusted Computing Platform. In this paper, we propose a simple and efficient method to implement anonymous authentication in such setting. The new scheme is proved to be secure under the strong RSA assumption and decisional Diffie-H...

متن کامل

An improved anonymous authentication scheme for roaming in ubiquitous networks

With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ...

متن کامل

An Improved Anonymous Authentication Scheme for Roaming Services

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wuhan University Journal of Natural Sciences

سال: 2023

ISSN: ['1007-1202', '1993-4998']

DOI: https://doi.org/10.1051/wujns/2023284317