计算机工程与应用 ›› 2015, Vol. 51 ›› Issue (1): 97-101.

• 网络、通信、安全 • 上一篇    下一篇

基于线性方程组的门限匿名认证方案

殷凤梅1,濮光宁2,张  江1,侯整风3   

  1. 1.合肥师范学院,合肥 230601
    2.安徽财贸职业学院,合肥 230601
    3.合肥工业大学 计算机与信息学院,合肥 230009
  • 出版日期:2015-01-01 发布日期:2015-01-06

Threshold anonymous authentication scheme based on linear equations

YIN Fengmei1, PU Guangning2, ZHANG Jiang1, HOU Zhengfeng3   

  1. 1.Hefei Normal University, Hefei 230601, China
    2.Anhui Finance and Trade Vocational College, Hefei 230601, China
    3.School of Computer and Information, Hefei University of Technology, Hefei 230009, China
  • Online:2015-01-01 Published:2015-01-06

摘要: 现有的很多匿名认证方案中,匿名认证过程较为复杂,匿名的可控性比较随意,针对这两个问题,在求解离散对数困难性的基础上,提出了一个新的门限匿名认证方案。借助线性方程组的求解理论,获得成员的秘密份额和公钥身份等信息;基于门限共享的思想,实现示证者身份的匿名认证和匿名追踪。该方案中认证者的匿名性、门限可追踪性以及身份的不可冒充性满足了匿名认证的安全需求,在电子商务、移动通信等众多领域将具有广阔的应用前景。

关键词: 匿名认证, 秘密共享, 线性方程组, 追踪性, 门限性

Abstract: Among the most of present anonymous authentication schemes, anonymous authentication process is complex, and the anonymous controllability is optional. To solve these two problems, a new threshold anonymous authentication scheme based on the intractability of the discrete logarithm is presented. With the help of the theory of solving linear equations, the member can get a share and the public key etc. Based on the idea of threshold secret sharing, the prover can be anonymous authenticated and anonymous tracked. The prover of the scheme is anonymous, threshold traceable, and inimitable, which can make the scheme well satisfy the security of anonymous authentication. The scheme will have broad application prospects in many fields such as electronic commerce, mobile communication.

Key words: anonymous authentication, secret sharing, linear equations, traceability, threshold