Anonymous authentication scheme based on one-off public key in pervasive computing environments
A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service pr...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing. |
---|---|
ISSN: | 1000-436X |