无证书的普适环境匿名认证方案
Certificate-Less Based Anonymous Authentication Scheme in Pervasive Computing Environments
DOI: 10.12677/SEA.2023.126094, PDF,    科研立项经费支持
作者: 罗长远:郑州工业应用技术学院信息工程学院,河南 郑州
关键词: 普适计算匿名认证无证书签名双线性对Pervasive Computing Anonymous Authentication Certificateless Signature Bilinear Pairings
摘要: 针对普适环境下的匿名认证问题,利用双线性对的相关特性,提出了一种无证书签名算法,算法中的签名矢量相对于签名者身份是一常量。基于该算法设计了一种匿名认证方案,方案中用户利用该算法对时戳签名作为认证信息,在安全认证的同时实现了用户匿名性。分析表明,用户端认证需要116.1 ms,计算量较小,方案在满足双向认证、用户匿名性和无关联性安全要求的同时,解决了现有方案存在的密钥托管问题。
Abstract: Considered the anonymous authentication in pervasive computing environments, a certificateless signature scheme was proposed based on bilinear parings. The verification result of the signature was a constant with respect to the signer’s identifier. Then an anonymous authentication scheme was constructed by combining the proposed signature scheme. During the authentication, a user constructed the signature of timestamp as authentication proof, which realized secure authentication and user anonymity. It is showed that it takes the client 116.1ms to realize authentication and the proposed scheme has less computation on the client side. It can achieve such security requirements as mutual authentication, user anonymity and non-linkability. Moreover, it resolves the problem of key escrow.
文章引用:罗长远. 无证书的普适环境匿名认证方案[J]. 软件工程与应用, 2023, 12(6): 958-964. https://doi.org/10.12677/SEA.2023.126094

参考文献

[1] Weiser, M. (1991) The Computer for the Twenty-First Century. Scientific American, 265, 94-104. [Google Scholar] [CrossRef
[2] Leung, A. and Mitchell, C.J. (2007) Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments. In: Krumm, J., Abowd, G.D., Seneviratne, A. and Strang, T., Eds., UbiComp 2007: Ubiquitous Computing. UbiComp 2007. Lecture Notes in Computer Science, Vol. 4717, Springer, Berlin, 73-90. [Google Scholar] [CrossRef
[3] 武海鹰, 基于上下文的普适计算使用控制模型[J]. 计算机应用, 2012,32(2): 489-492.
[4] 高大利, 孙凌, 辛艳. 基于角色-权限的普适计算受限委托方法[J]. 计算机应用, 2011, 31(5): 1298-1301.
[5] 彭华熹, 冯登国. 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006, 27(9): 78-85.
[6] 彭华熹. 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006, 29(8): 1271-1281.
[7] Cao, X.F., Zeng, X.W., Kou, W.D. and Hu, L.B. (2009) Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks. IEEE Transactions on Vehicular Technology, 58, 3508-3517. [Google Scholar] [CrossRef
[8] Al-Riyami, S.S. and Paterson, K.G. (2003) Certificateless Public Key Cryptography. In: Laih, CS. Eds., Advances in Cryptology-ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, Vol. 2894, Springer, Berlin, Heidelberg, 452-473. [Google Scholar] [CrossRef
[9] Dai, W. (2004) Crypto++ 5.2.1 Benchmarks.
https://www.cryptopp.com/wiki/Main_Page
[10] Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2006) Securing Mobile Ad Hoc Networks with Certificateless Public Keys. IEEE Transactions on Dependable and Secure Computing, 3, 386-399. [Google Scholar] [CrossRef
[11] Ren, K., Lou, W., Zeng, K. and Moran, P.J. (2007) On Broadcast Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 6, 4136-4144. [Google Scholar] [CrossRef
[12] MIRACL (2012) Multiprecision Integer and Rational Arithmetic C/C++ Library.
http://indigo.ie/~mscott/