Anonymous authentication scheme based on one-off public key in pervasive computing environments
A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service pr...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539934136041472 |
---|---|
author | Chang-yuan LUO Shi-wei HUO Hong-zhi XING |
author_facet | Chang-yuan LUO Shi-wei HUO Hong-zhi XING |
author_sort | Chang-yuan LUO |
collection | DOAJ |
description | A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing. |
format | Article |
id | doaj-art-23ca37504fef40fdacfab52e53fa0364 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-23ca37504fef40fdacfab52e53fa03642025-01-14T06:31:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-02-0133939859660192Anonymous authentication scheme based on one-off public key in pervasive computing environmentsChang-yuan LUOShi-wei HUOHong-zhi XINGA signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/pervasive computinganonymous authenticationone-off public keyidentity-based cryptography |
spellingShingle | Chang-yuan LUO Shi-wei HUO Hong-zhi XING Anonymous authentication scheme based on one-off public key in pervasive computing environments Tongxin xuebao pervasive computing anonymous authentication one-off public key identity-based cryptography |
title | Anonymous authentication scheme based on one-off public key in pervasive computing environments |
title_full | Anonymous authentication scheme based on one-off public key in pervasive computing environments |
title_fullStr | Anonymous authentication scheme based on one-off public key in pervasive computing environments |
title_full_unstemmed | Anonymous authentication scheme based on one-off public key in pervasive computing environments |
title_short | Anonymous authentication scheme based on one-off public key in pervasive computing environments |
title_sort | anonymous authentication scheme based on one off public key in pervasive computing environments |
topic | pervasive computing anonymous authentication one-off public key identity-based cryptography |
url | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/ |
work_keys_str_mv | AT changyuanluo anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments AT shiweihuo anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments AT hongzhixing anonymousauthenticationschemebasedononeoffpublickeyinpervasivecomputingenvironments |