Abstract

In order to protect the user's privacy identity, authentication requires anonymous authentication. Anonymous authentication is divided into unconditional anonymous authentication and traceable anonymous authentication. Unconditional anonymous authentication can verify that the user belongs to an anonymous set, but the user's true identity cannot be obtained. However, in some applications, it is necessary to trace the true identity of the user. Therefore, a traceable anonymous authentication scheme is proposed. In order to prevent random tracing, the proposed scheme uses threshold joint tracing. When the identity of the authenticator needs to be traced, the threshold number of members can jointly trace the identity of the authenticator. In some special network applications such as anonymous electronic voting, in order to prevent repeated authentications and repeated elections, it is necessary to verify whether the two authentication signatures are signed by the same user without revealing the true identity of the user. Therefore, the proposed anonymous authentication scheme should have selective linkability. In order to achieve linkable authentication, the linkable tag is embedded by linkable ring signature. Compared with similar schemes through the simulation experiments, the implementation time of the proposed scheme is slightly better than other schemes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call