非可信阈值认证方案的博弈分析

Jie Wang, Yongquan Cai
{"title":"非可信阈值认证方案的博弈分析","authors":"Jie Wang, Yongquan Cai","doi":"10.1109/CIS.2010.104","DOIUrl":null,"url":null,"abstract":"In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.","PeriodicalId":420515,"journal":{"name":"2010 International Conference on Computational Intelligence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Game Analysis of Non-trusted Threshold Authentication Scheme\",\"authors\":\"Jie Wang, Yongquan Cai\",\"doi\":\"10.1109/CIS.2010.104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.\",\"PeriodicalId\":420515,\"journal\":{\"name\":\"2010 International Conference on Computational Intelligence and Security\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2010.104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2010.104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在传统的身份认证系统中,用户证书是由认证中心分发的,作为用户的认证凭证,但是这种认证系统有很多不足,不安全。针对现有认证方案的不足,提出了一种无需可信中心参与的阈值认证方案。证书由小组成员共同颁发。提出了一种惩罚机制,并将其纳入该方案。该方案分为五个阶段,并在每个阶段运用博弈论对其安全性进行了分析。结果表明,该方案具有鲁棒性和安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Game Analysis of Non-trusted Threshold Authentication Scheme
In traditional identity authentication system the user certificate is distributed by the certification center as a user authentication credentials, but this certification system has a lot of deficiencies, it is not safe. Aiming at the weakness of existing schemes, we propose a threshold authentication scheme without trusted center’s participation. The certificate is issued by the group members together. A punishment mechanism is presented and incorporated into the scheme. The program is divided into five stages, and at each stage of the program we analyze its security with game theory. The result indicates that the scheme is a robust and secure.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信