{"title":"Game Analysis of Non-trusted Threshold Authentication Scheme","authors":"Jie Wang, Yongquan Cai","doi":"10.1109/CIS.2010.104","DOIUrl":null,"url":null,"abstract":"In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.