Computer Engineering and Applications ›› 2014, Vol. 50 ›› Issue (24): 81-85.

Previous Articles     Next Articles

Anonymous authentication scheme based on secure multiparty computation

ZHOU Wenqin1,2, ZHANG Yechi1,2, SHI Runhua1,2   

  1. 1.Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China
    2.School of Computer Science and Technology, Anhui University, Hefei 230039, China
  • Online:2014-12-15 Published:2014-12-12

基于安全多方计算的匿名认证方案

周文钦1,2,张也弛1,2,石润华1,2   

  1. 1.安徽大学 计算智能与信号处理教育部重点实验室,合肥 230039
    2.安徽大学 计算机科学与技术学院,合肥 230039

Abstract: This paper takes anonymous authentication as a special secure multi-party computation problem and turns to the solution of this problem. This paper constructs an anonymous authentication model based on the basic theory of solving linear equations. A secure two-party multiplication protocol of matrix and vector is presented, and further the whole anonymous authentication scheme is proposed based on this multiplication protocol. The proposed scheme is secure and efficient, and it is very adaptable for resource-constrained devices or networks since its storage cost is low.

Key words: cryptography, secure multiparty computation, anonymous authentication, linear equations

摘要: 把匿名认证抽象为一个具体的安全多方计算问题,转而寻求对该具体问题的求解。基于线性方程组的求解理论,构建了一个匿名认证模型。继而设计了一个两方安全计算矩阵与向量乘积协议,并基于该协议提出了一个完整的匿名认证方案。该方案安全、高效,存储开销小,特别适宜于资源受限的设备或网络。

关键词: 密码编码学, 安全多方计算, 匿名认证, 线性方程组