Anonymous authentication scheme based on one-off public key in pervasive computing environments

A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Chang-yuan LUO, Shi-wei HUO, Hong-zhi XING
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.
ISSN:1000-436X