Zero-knowledge proofs of identity
Journal of Cryptology
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
A zero-knowledge identification scheme based on the q-ary syndrome decoding problem
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Currently most existing entity authentication protocols can not guarantee anonymity against compromised verifier in semi-honest model. To solve the question, this paper puts forward a shared certificate entity authentication model, by which some qualities for anonymous entity authentication in semi-honest situation are suggested reasonably. On basis of our proposed model, this paper designs two anonymous entity authentication protocols including an anonymous shared certificate bi-entity authentication protocol and an anonymous shared certificate multi-entity authentication protocol. In proposed protocols it is only single certificate that is used to verify identity correctly and anonymously for legitimate users who has different identity secret. Any compromised verifier has capability to verify correctly whether the user identity is legitimate or not, but it is difficult for it to judge which legitimate user has been verified and distinguish who the verifying user is in particular, therefore attacker does not learn any useful information from legitimate user by spying upon the information of public channel or compromising the certificate. So the security requirements of anonymous entity authentication are achieved successfully, meanwhile the proposed model is more feasibly and effective than zero knowledge protocol in practical applications.