期刊文献+

无线网状网中基于盲签名的匿名认证方案 被引量:1

Blind Signature Based Anonymous Authentication Scheme in Wireless Mesh Networks
原文传递
导出
摘要 从提高用户匿名性的角度出发,利用盲签名和部分盲签名分别实现了在无线网状网中的身份匿名和基于假名的位置匿名,用户可以根据自己的需要选择服务提供者规定的匿名集以及匿名次数. It presents an anonymous authentication scheme based on blind signature and a scheme based on partially blind signature, in order to improve user anonymity, protect user's identity privacy and pseudonym based location privacy from Wireless mesh networks (WMNs) infrastructure respectively. Users can select an anonymous set determined by the service provider and the times to authenticate anonymously according to their needs.
出处 《福建师范大学学报(自然科学版)》 CAS CSCD 北大核心 2013年第2期23-27,39,共6页 Journal of Fujian Normal University:Natural Science Edition
基金 国家自然科学基金资助项目(61072080) 福建省高校产学合作科技重大项目(2011H6008) 福建省自然科学基金资助项目(2011J5148) 福建省科技厅K类项目(JK2011010)
关键词 无线网状网 匿名认证 盲签名 部分盲签名 wireless mesh networks anonymous authentication blind signature partially blind signature
  • 相关文献

参考文献14

  • 1Akyildiz I F, Wang X, Wang W. Wireless mesh networks : a survey [ J]. Computer Networks, 2005, 47 (4) : 445 - 487. 被引量:1
  • 2Zhu H J, Lin X D, Lu R X, et al. SLAB: A secure localized authentication and billing scheme for wireless mesh net- works [J]. Wireless Communications, IEEE Transactions on, 2008, 7 (10) : 3858 -3868. 被引量:1
  • 3Yang G M, Huang Q, Wong D S, et al. Universal authentication protocols for anonymous wireless communications [ J ]. Wireless Communications, IEEE Transactions on, 2010, 9 ( 1 ) : 168 - 174. 被引量:1
  • 4Karunanithi P, Karuppanan K. Efficient distributed group authentication protocol for vehicular ad hoc network [ C ] ff Advances in Computing and Communications, Springer-Verlag, 2011:624 -633. 被引量:1
  • 5Chaum D. Security without identification transaction systems to make big brother obsolete [ J ]. Communication of the ACM, 1985, 28 (10): 1030-1044. 被引量:1
  • 6Xu L, Chen S S, Huang X Y, et aL Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks [J]. International Journal of Security and Networks, 2010, 5 ( 1 ) : 35 -44. 被引量:1
  • 7Teranishi I, Furukawa J, Sako k. K-times anonymous authentication [ C ] // Advances in Cryptology-ASIACRYPT 2004, Springer-Verlag, 2004:81-95. 被引量:1
  • 8Nguyen L, Safavi-naini R. Dynamic k-times anonymous authentication [ C] //Applied Cryptography and Network Securi- ty, Springer-Verlag, 2005:219-250. 被引量:1
  • 9Sun J Y, Zhang C, Zhang Y C, et al. An identity-based security system for user privacy in vehicular ad hoc networks [J]. Parallel and Distributed Systems, IEEE Transactions on, 2010, 21 (9) : 1227- 1239. 被引量:1
  • 10Chaum D. Blind signatures for untraceable payments [ C ]//Advances in Cryptology-CRYPTO' 82, New York: Ple- num Press, 1983 : 199 - 205. 被引量:1

同被引文献30

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部