{"title":"非可信阈值认证方案的博弈分析","authors":"Jie Wang, Yongquan Cai","doi":"10.1109/CIS.2010.104","DOIUrl":null,"url":null,"abstract":"In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Game Analysis of Non-trusted Threshold Authentication Scheme\",\"authors\":\"Jie Wang, Yongquan Cai\",\"doi\":\"10.1109/CIS.2010.104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.\",\"PeriodicalId\":420515,\"journal\":{\"name\":\"2010 International Conference on Computational Intelligence and Security\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2010.104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Game Analysis of Non-trusted Threshold Authentication Scheme
In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.