期刊文献+

一种基于身份一次性公钥的构造 被引量:12

Construction of the One-Off Public Key Based on Identity
下载PDF
导出
摘要 该文利用基于身份的密码系统,构造一个一次性公钥,来解决Internet通信的匿名性问题。在该系统中,用户只需由可信中心颁发一次私钥,而在每次活动时自己生成不同的公钥,通过与之对应的签名方案,在认证用户身份的同时,保证用户的匿名性和多次活动之间的不可联系性。另外,在必要时,可以联合可信中心揭示用户的真实身份,以防止用户的恶意活动。 In order to resolve the problem of Internet communication anonymity, the paper constructs one-off public key using identity-based cryptography. In this system, user only needs TC(Trust Center) issuing the private key one time, and he can generate his different public keys when uses it. So it can ensure the user's anonymity and the disconnection among the user's actions, And TC can reveal the user's identity to preventing the user committing when occasion requires.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第8期1412-1414,共3页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60372094)资助课题
关键词 保密通信 匿名性 基于身份 一次性公钥 双线性映射 Secret communication, Anonymity, Identity-based, One-off public key, Bilinear map
  • 相关文献

参考文献8

  • 1冯登国.电子商务中的安全认证问题[R].北京:中国科技大学研究生院,1997:23-27.
  • 2Herreweghen E.Secure anonymous signature-based transactions[A].Proceedings of ESORICS 2000[C].London,UK,SpringerVerlag,2000:55-71.
  • 3张秋璞,郭宝安.基于ID的一次性盲公钥[J].电子学报,2003,31(5):769-771. 被引量:15
  • 4Hess F.Exponent group signature schemes and efficient identity based signature schemes based on pairing[EB/OL].Available from http://epring.iacr.org,2002.
  • 5Shamir A.Identity-base cryptosystems and signature schemes[C].Proc.of Crypto'84,Lecture Notes in Computer Science,SpringerVerlag,1984,Vol.196:47-53.
  • 6Silverman J H.The arithmetic of elliptic curves[D].Graduate Texts in Mathematic,Springer -Verlag,1986:106:96-99.
  • 7Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C].In:Proc Crypto 2001,LNCS,Springer-Verlag,2001:2139:213-229.
  • 8Paterson K.ID-based signatures from pairing on elliptic curves[EB/OL].Available from http://epring.iacr.org,2002.

二级参考文献8

  • 1冯登国.电子商务中的安全认证问题[M].北京:中心科技大学研究生院,1997.23—27.
  • 2Chaum D. Blind signature systems[ A]. Proceedings of Crypto'83 [ C].Plenum Press, 1984. 153 - 157.
  • 3Okamoto T, Ohta K. Universal electronic cash[ A]. Advances in Cryptology-Crypt'91 [ C]. Springer- Verlag, 1992. 324 - 337.
  • 4Stalder M, Piveteau J M. Camenisch J. Fair blind signatures[ A]. Advances in Cryptology-Eurocrypt'95 [ C]. Springer-Verlag, 1995. 209 -219.
  • 5Herreweghen E. Secure anonymous signature-based transactions [A].Proceedings of ESORICS 2000[ C ]. Springer-Verlag, 2000.55 - 71.
  • 6Boneh D, DeMillo R A, Lipton R J. On the importance of checking eryptographic protocols for faults [ A ]. Advances in Cryptology-Eurocrypt 97 [C] . Spnnger-Verlag, 1997.37 - 51.
  • 7Shamir A. Identity-based eryptosystems and signature schemes [ A ].Proeedings of CRYPTO'84[C]. Springer-Verlag, 1984.47 - 53.
  • 8Gennaro R, Krawczyk H, Rabin T. RSA-based undeniable signatures[ A]. Proceedings of CRYPTO'97[ C]. Springer-Verlag, 132 - 149.

共引文献14

同被引文献58

引证文献12

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部