Back to Search Start Over

Study on Pseudonym Signature Scheme of Trusted Third Party

Authors :
CHEN Hong, CHEN Honglin, HUANG Jie, XIAO Chenglong, GUO Pengfei, JIN Haibo
Source :
Jisuanji kexue yu tansuo, Vol 14, Iss 8, Pp 1327-1337 (2020)
Publication Year :
2020
Publisher :
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press, 2020.

Abstract

User data on the Internet are extremely easy to leak, and the anonymity and security issues of users need to be resolved. The pseudonym system can make users remain anonymous in network communication, but there are risks of collusion between authentication agencies and domain management agencies and a slow response to the offending user. Aiming at this problem, a pseudonym signature scheme involving trusted third parties is proposed in this paper. The user first applies to the certificate authority for a license permitting the use of a pseudonym, then uses the license to apply for the pseudonym certificate from the domain authority, and uses the pseudonym to construct a pseudonym signature in the domain. Finally, users with illegal operations are quickly detected by tracking center (trusted third party), and the certificate authority will handle the corresponding processing. The proposed scheme guarantees the anonymity of users better by using double pseudonyms, reduces the operation cost of the certificate authority, improves the threshold of the system, has fast response ability in acquiring the real identity of users who violate the rules, and reduces the potential loss of the system caused by users illegal operations.

Details

Language :
Chinese
ISSN :
16739418
Volume :
14
Issue :
8
Database :
OpenAIRE
Journal :
Jisuanji kexue yu tansuo
Accession number :
edsair.doajarticles..0cfa659ddc41676b621132459cdd1f3e