Anonymous authentication scheme based on one-off public key in pervasive computing environments

A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Chang-yuan LUO, Shi-wei HUO, Hong-zhi XING
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539934136041472
author Chang-yuan LUO
Shi-wei HUO
Hong-zhi XING
author_facet Chang-yuan LUO
Shi-wei HUO
Hong-zhi XING
author_sort Chang-yuan LUO
collection DOAJ
description A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.
format Article
id doaj-art-23ca37504fef40fdacfab52e53fa0364
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-23ca37504fef40fdacfab52e53fa03642025-01-14T06:31:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-02-0133939859660192Anonymous authentication scheme based on one-off public key in pervasive computing environmentsChang-yuan LUOShi-wei HUOHong-zhi XINGA signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/pervasive computinganonymous authenticationone-off public keyidentity-based cryptography
spellingShingle Chang-yuan LUO
Shi-wei HUO
Hong-zhi XING
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Tongxin xuebao
pervasive computing
anonymous authentication
one-off public key
identity-based cryptography
title Anonymous authentication scheme based on one-off public key in pervasive computing environments
title_full Anonymous authentication scheme based on one-off public key in pervasive computing environments
title_fullStr Anonymous authentication scheme based on one-off public key in pervasive computing environments
title_full_unstemmed Anonymous authentication scheme based on one-off public key in pervasive computing environments
title_short Anonymous authentication scheme based on one-off public key in pervasive computing environments
title_sort anonymous authentication scheme based on one off public key in pervasive computing environments
topic pervasive computing
anonymous authentication
one-off public key
identity-based cryptography
url http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/
work_keys_str_mv AT changyuanluo anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments
AT shiweihuo anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments
AT hongzhixing anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments