无线网状网中基于盲签名的匿名认证方案Blind Signature Based Anonymous Authentication Scheme in Wireless Mesh Networks
何源;许力;黄欣沂;
摘要(Abstract):
从提高用户匿名性的角度出发,利用盲签名和部分盲签名分别实现了在无线网状网中的身份匿名和基于假名的位置匿名,用户可以根据自己的需要选择服务提供者规定的匿名集以及匿名次数.
关键词(KeyWords): 无线网状网;匿名认证;盲签名;部分盲签名
基金项目(Foundation): 国家自然科学基金资助项目(61072080);; 福建省高校产学合作科技重大项目(2011H6008);; 福建省自然科学基金资助项目(2011J5148);; 福建省科技厅K类项目(JK2011010)
作者(Authors): 何源;许力;黄欣沂;
参考文献(References):
- [1]Akyildiz I F,Wang X,Wang W.Wireless mesh networks:a survey[J].Computer Networks,2005,47(4):445-487.
- [2]Zhu H J,Lin X D,Lu R X,et al.SLAB:A secure localized authentication and billing scheme for wireless mesh net-works[J].Wireless Communications,IEEE Transactions on,2008,7(10):3858-3868.
- [3]Yang G M,Huang Q,Wong D S,et al.Universal authentication protocols for anonymous wireless communications[J].Wireless Communications,IEEE Transactions on,2010,9(1):168-174.
- [4]Karunanithi P,Karuppanan K.Efficient distributed group authentication protocol for vehicular ad hoc network[C]∥Advances in Computing and Communications,Springer-Verlag,2011:624-633.
- [5]Chaum D.Security without identification transaction systems to make big brother obsolete[J].Communication of theACM,1985,28(10):1030-1044.
- [6]Xu L,Chen S S,Huang X Y,et al.Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks[J].International Journal of Security and Networks,2010,5(1):35-44.
- [7]Teranishi I,Furukawa J,Sako k.K-times anonymous authentication[C]∥Advances in Cryptology-ASIACRYPT 2004,Springer-Verlag,2004:81-95.
- [8]Nguyen L,Safavi-naini R.Dynamic k-times anonymous authentication[C]∥Applied Cryptography and Network Securi-ty,Springer-Verlag,2005:219-250.
- [9]Sun J Y,Zhang C,Zhang Y C,et al.An identity-based security system for user privacy in vehicular ad hoc networks[J].Parallel and Distributed Systems,IEEE Transactions on,2010,21(9):1227-1239.
- [10]Chaum D.Blind signatures for untraceable payments[C]∥Advances in Cryptology-CRYPTO’82,New York:Ple-num Press,1983:199-203.
- [11]Abe M,Fujisaki E.How to date blind signatures[C]∥Advances in Cryptology-ASIACRYPT'96,Springer-Verlag,1996:244-255.
- [12]Chaum D.Blind signatures system[C]∥CRYPTO'83.New York:Plenum Press,1993:153-158.
- [13]Boldyreva A.Threshold signatures,multisignatures and blind signatures based on the gap-Diffie-Hellman-group signaturescheme[C]∥Public Key Cryptography-PKC 2003,Springer-Verlag,2002:31-46.
- [14]Zhang F G,Safavi-naini R,Susilo W.Efficient verifiably encrypted signature and partially blind signature from bilinearpairings[C]∥Progress in Cryptology-INDOCRYPT 2003,Springer-Verlag,2003:71-84.