Privacy‐aware PKI model with strong forward security
2020; Wiley; Volume: 37; Issue: 12 Linguagem: Inglês
10.1002/int.22283
ISSN1098-111X
AutoresFengyin Li, Zhongxing Liu, Tao Li, JU Hong-wei, Hua Wang, Huiyu Zhou,
Tópico(s)Internet Traffic Analysis and Secure E-voting
ResumoInternational Journal of Intelligent SystemsVolume 37, Issue 12 p. 10049-10065 RESEARCH ARTICLE Privacy-aware PKI model with strong forward security Fengyin Li, Fengyin Li School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorZhongxing Liu, Zhongxing Liu School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorTao Li, Tao Li School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHongwei Ju, Hongwei Ju Experimental Teaching and Equipments Management Center, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHua Wang, Hua Wang School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHuiyu Zhou, Corresponding Author Huiyu Zhou hz143@leicester.ac.uk School of Informatics, University of Leicester, Leicester, UK Correspondence Huiyu Zhou, School of Informatics, University of Leicester, Leicester LE1 7RH, UK. Email: hz143@leicester.ac.ukSearch for more papers by this author Fengyin Li, Fengyin Li School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorZhongxing Liu, Zhongxing Liu School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorTao Li, Tao Li School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHongwei Ju, Hongwei Ju Experimental Teaching and Equipments Management Center, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHua Wang, Hua Wang School of Information Science and Engineering, Qufu Normal University, Rizhao, ChinaSearch for more papers by this authorHuiyu Zhou, Corresponding Author Huiyu Zhou hz143@leicester.ac.uk School of Informatics, University of Leicester, Leicester, UK Correspondence Huiyu Zhou, School of Informatics, University of Leicester, Leicester LE1 7RH, UK. Email: hz143@leicester.ac.ukSearch for more papers by this author First published: 30 August 2020 https://doi.org/10.1002/int.22283Citations: 11Read the full textAboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinkedInRedditWechat Abstract With the development of network technology, privacy protection and users anonymity become a new research hotspot. The existing blockchain privacy-aware public key infrastructure (PKI) model can ensure the privacy of users in the authentication process to a certain extent, but there are still problems of the storage and leakage of users' keys. This paper first proposes a strong forward-secure ring signature scheme based on RSA, which ensures the anonymity of the signing users and the forward-backward security of the keys. Then, by introducing the ring signature technology into the privacy-aware PKI model, this paper proposes a privacy-aware PKI model with strong forward security based on block chains, which not only ensures the users' identity privacy, but also solves the problem of the storage and leakage of the users' keys, greatly improving the success rate and security of the users' identity authentication. Finally, this paper applies the proposed PKI model to anonymous transactions, designs a privacy-aware anonymous transaction model with strong forward security, realizing anonymous transactions without relying on trusted third parties, and implementing users' privacy protection. Citing Literature Volume37, Issue12December 2022Pages 10049-10065 RelatedInformation
Referência(s)