CN104125199A - Attribute-based anonymous authentication method and system thereof - Google Patents
Attribute-based anonymous authentication method and system thereof Download PDFInfo
- Publication number
- CN104125199A CN104125199A CN201310148635.1A CN201310148635A CN104125199A CN 104125199 A CN104125199 A CN 104125199A CN 201310148635 A CN201310148635 A CN 201310148635A CN 104125199 A CN104125199 A CN 104125199A
- Authority
- CN
- China
- Prior art keywords
- user
- attribute
- attributes
- anonymous
- credential
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012795 verification Methods 0.000 claims abstract description 21
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 239000003795 chemical substances by application Substances 0.000 description 15
- 230000008569 process Effects 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 10
- 238000004364 calculation method Methods 0.000 description 8
- 238000007726 management method Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 230000006854 communication Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000012550 audit Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明公开了一种基于属性的匿名认证方法,本方法为:1)可信方TP根据设定的安全参数,生成一主密钥x和系统公开参数;2)用户U向TP注册提交属性,发起属性凭证签发请求;3)TP验证用户U所拥有的属性,并根据U的属性、主密钥x和系统公开参数为其颁发属性凭证;4)用户U向服务提供方SP发起访问请求;5)SP查找该访问请求对应的访问策略返回给该用户U;6)用户U根据该访问策略选择要使用的属性,然后利用该属性凭证和私钥r计算一匿名凭证,并发送给SP;7)SP验证该匿名凭证,若验证通过并满足该访问策略,则接受该访问请求,提供对应的服务给该用户。本发明保证了用户的隐私性,支持更灵活的门限属性选择性出示方案。
The invention discloses an attribute-based anonymous authentication method. The method is as follows: 1) The trusted party TP generates a master key x and system public parameters according to the set security parameters; 2) User U registers and submits attributes to TP , initiate an attribute certificate issuance request; 3) TP verifies the attributes owned by user U, and issues attribute certificates to U according to U’s attributes, master key x and system public parameters; 4) User U initiates an access request to service provider SP ; 5) The SP finds the access policy corresponding to the access request and returns it to the user U; 6) The user U selects the attribute to use according to the access policy, then uses the attribute certificate and private key r to calculate an anonymous certificate, and sends it to the SP ; 7) The SP verifies the anonymous credential, and if it passes the verification and satisfies the access policy, it accepts the access request and provides corresponding services to the user. The invention ensures the user's privacy and supports a more flexible scheme for selectively presenting threshold attributes.
Description
技术领域technical field
本发明属于计算机技术与信息安全领域,涉及云计算环境下对用户访问服务行为的隐私进行保护以及防止隐私泄露的方法,具体表现为一种基于属性的匿名认证方法及系统。The invention belongs to the field of computer technology and information security, and relates to a method for protecting the privacy of user access service behaviors in a cloud computing environment and preventing privacy leakage, and is specifically embodied as an attribute-based anonymous authentication method and system.
背景技术Background technique
随着互联网以及移动互联网的发展,人们的日常生活对网络服务的依赖程度越来越高,网络服务开始涉及衣食住行的各个方面。尤其是近几年云计算概念的提出,使得网络服务汇集到互联网上,电子政务,电子商务,电子医疗,各种企业级应用管理系统广泛应用,网上阅览,购物,社交,游戏等个人消费行为也越来越多。现实生活中的许多活动并不需要出具身份证明,而网络应用中的身份管理系统却要求用户进行身份认证,并严格约束和监控用户访问系统或应用。因此用户在网络活动中的行为,喜好等隐私信息可能会在认证身份时泄露,被服务提供商的审计功能所追踪甚至分析,使用户的利益受到伤害,已经有越来越多的人意识到,这已经严重威胁到用户的隐私,如何避免隐私泄露成为当前网络发展亟待解决的问题。With the development of the Internet and mobile Internet, people's daily life is increasingly dependent on network services, and network services have begun to involve all aspects of basic necessities of life. Especially in recent years, the concept of cloud computing has brought together network services on the Internet, e-government, e-commerce, e-medicine, and various enterprise-level application management systems are widely used, and personal consumption behaviors such as online browsing, shopping, social networking, and games And more and more. Many activities in real life do not require identification, but the identity management system in network applications requires users to authenticate, and strictly restricts and monitors users' access to systems or applications. Therefore, the user's behaviors in network activities, private information such as preferences may be leaked during identity authentication, tracked and even analyzed by the service provider's audit function, and the interests of users will be harmed. More and more people have realized that , which has seriously threatened the privacy of users, how to avoid privacy leakage has become an urgent problem to be solved in the current network development.
目前身份认证的一项重要技术是基于X.509体系的数字证书体系,但是以X.509公钥证书体系及网络身份认证技术在隐私保护方面存在很多风险:第一,在注册RA阶段需要用户提交身份信息;第二,公钥证书可以公开获取,其中包含用户信息;第三,公钥目录和撤销列表会泄露用户的某些隐私信息;第四,进行认证时身份是完全公开的。传统的认证过程,实际上是身份识别与认证的结合,这样就有过多的用户信息提供给了服务提供商,造成了用户隐私的泄露,给用户带来安全威胁。而实际应用场景中,服务提供商需要知道是用户是否具有访问服务的资格,而不是用户具体的身份信息。At present, an important technology for identity authentication is the digital certificate system based on the X.509 system, but there are many risks in privacy protection with the X.509 public key certificate system and network identity authentication technology: First, users are required to Submit identity information; second, the public key certificate can be obtained publicly, which contains user information; third, the public key directory and revocation list will leak some private information of the user; fourth, the identity is completely disclosed during authentication. The traditional authentication process is actually a combination of identification and authentication, so that too much user information is provided to the service provider, resulting in the leakage of user privacy and bringing security threats to users. In actual application scenarios, the service provider needs to know whether the user is qualified to access the service, not the specific identity information of the user.
因此对于用户的隐私保护,匿名凭证及其认证技术的研究成为一个热点,匿名认证的核心思想是在认证过程中将用户的资格与身份识别分开,即在认证过程中只验证用户是某一集合内的成员,而不泄露其具体身份。传统的匿名认证方案如环签名、群签名等,是指用户可以根据具体场景的要求,向服务提供者证明其拥有的身份凭证属于某个特定的用户集合(有资格访问服务的集合),但服务提供者无法识别出用户究竟是该特定用户集合中的哪一个具体用户,因此该技术是通过对用户身份的隐藏来实现个人隐私保护。然而随着基于属性签名等具有隐私保护性质签名技术的出现和发展,为匿名认证方案的设计提出了一种新的思路。基于属性的签名(Atrribute Based Signature,ABS)中用户的密钥中包含若干属性信息,之后用户可使用其私钥对消息进行签名。与环签名类似,ABS方案生成的签名可被验证是满足相关属性组合的用户所生成,但无法确定签名的具体生成者。ABS方案是以属性为中心的匿名凭证及认证体系架构,把用户角色、关系、个人信息等抽象成属性,服务方可根据用户属性制定资源访问控制策略;而用户方面也可以建立自己的安全策略,设置是否允许属性提取,通过这种方式实现基于属性的用户匿名访问。由于ABS签名方案本身已经实现了用户匿名性与对属性的证明,因此可以较为容易的转化为匿名认证方案。与传统的匿名认证方案相比,ABS方案具有较高的效率(在一定条件下门限ABS方案可实现常数复杂度的签名长度和校验过程,其计算代价与消息长度都要远远小于类似的匿名认证方案),且可以证明更复杂的安全策略(门限等)。综上所述,研究基于ABS等新型签名方案的匿名凭证方案,也是匿名认证证系统可行的研究方向。Therefore, for user privacy protection, research on anonymous credentials and its authentication technology has become a hot spot. The core idea of anonymous authentication is to separate the user's qualifications from identity identification in the authentication process, that is, only verify that the user is a certain set during the authentication process. members within without disclosing their specific identities. Traditional anonymous authentication schemes such as ring signatures, group signatures, etc. mean that users can prove to service providers that their identity credentials belong to a specific set of users (sets eligible to access services) according to the requirements of specific scenarios, but The service provider cannot identify which specific user in the specific user set the user is, so this technology realizes personal privacy protection by hiding the identity of the user. However, with the emergence and development of privacy-preserving signature technologies such as attribute-based signatures, a new idea is proposed for the design of anonymous authentication schemes. In Attribute Based Signature (ABS), the user's key contains several attribute information, and then the user can use his private key to sign the message. Similar to the ring signature, the signature generated by the ABS scheme can be verified to be generated by a user who satisfies the combination of relevant attributes, but the specific generator of the signature cannot be determined. The ABS solution is an attribute-centric anonymous credential and authentication system architecture, which abstracts user roles, relationships, and personal information into attributes. The server can formulate resource access control strategies based on user attributes; and users can also establish their own security policies. , to set whether to allow attribute extraction, in this way to achieve attribute-based user anonymous access. Since the ABS signature scheme itself has realized user anonymity and proof of attributes, it can be easily transformed into an anonymous authentication scheme. Compared with the traditional anonymous authentication scheme, the ABS scheme has higher efficiency (under certain conditions, the threshold ABS scheme can realize the signature length and verification process of constant complexity, and its calculation cost and message length are much smaller than similar anonymous authentication schemes), and can prove more complex security policies (thresholds, etc.). To sum up, researching anonymous credential schemes based on new signature schemes such as ABS is also a feasible research direction for anonymous authentication certificate systems.
目前,已经有一些研究项目将匿名认证相关技术作为研究的重点内容,包括Oasis组织的shibboleth项目和自由联盟的Liberty项目等,但这些项目的核心技术是在通信过程中使用假名,使第三方无法获取用户的个人信息,然而服务提供方依然能够获取用户的真实身份,并能够将用户行为进行关联,从而破坏用户的个人隐私。,本发明中服务提供方只能获取服务所需的属性,而获取不到其他属性,从而无法进行活动关联,进而无法获得用户真实身份。At present, there are already some research projects that focus on technologies related to anonymous authentication, including the shibboleth project organized by Oasis and the Liberty project of Liberty Alliance, etc., but the core technology of these projects is to use pseudonyms in the communication process so that third parties Obtain the user's personal information, but the service provider can still obtain the user's real identity and associate user behavior, thereby destroying the user's personal privacy. , in the present invention, the service provider can only obtain the attributes required by the service, but cannot obtain other attributes, so that the activity association cannot be performed, and the real identity of the user cannot be obtained.
发明内容Contents of the invention
本发明的目的之一在于克服现有技术中存在的问题,提供一种基于属性的匿名认证方法及系统。具体的说,本发明包括以下两个重要的方面:第一设计了一种基于属性的签名的匿名认证算法;第二设计了一种基于属性的匿名认证系统。One of the objectives of the present invention is to overcome the problems existing in the prior art and provide an attribute-based anonymous authentication method and system. Specifically, the present invention includes the following two important aspects: firstly, an anonymous authentication algorithm based on attribute-based signature is designed; secondly, an attribute-based anonymous authentication system is designed.
一、基于属性的匿名认证方法1. Attribute-based anonymous authentication method
本发明的目的在于提供一种基于属性的匿名认证系统来加强对用户的隐私保护,通过可信方认证用户并为用户颁发属性凭证,用户向服务方出示属性,并由服务方验证属性凭证的方式来完成认证过程。本发明的基于属性的匿名认证方法主要包括一个基于属性的签名方案,匿名凭证的出示和验证系统为运行匿名认证协议的系统提供匿名凭证的出示和验证功能,提供了匿名凭证出示与验证算法的实现,可支持对用户属性的门限断言出示。The purpose of the present invention is to provide an attribute-based anonymous authentication system to strengthen the privacy protection of users. The trusted party authenticates the user and issues the attribute certificate to the user. The user presents the attribute to the server, and the server verifies the identity of the attribute certificate. way to complete the authentication process. The attribute-based anonymous authentication method of the present invention mainly includes an attribute-based signature scheme, and the anonymous credential presentation and verification system provides anonymous credential presentation and verification functions for the system running the anonymous authentication protocol, and provides an anonymous credential presentation and verification algorithm. Realized to support threshold assertion presentation of user attributes.
属性出示方案的基本性质:The properties present the basic properties of the scheme:
●匿名性●Anonymity
●不可关联性●Non-associative
●属性的选择出示:应用无法获得与策略无关的属性信息●Presentation of attribute selection: the application cannot obtain attribute information irrelevant to the policy
该签名方案包含三个主要的算法,各算法的功能如下:(此处仅简单介绍各算法的功能,将在具体实施方式中详细说明算法的参数及计算过程)The signature scheme includes three main algorithms, and the functions of each algorithm are as follows: (Here only briefly introduces the functions of each algorithm, and will detail the parameters and calculation process of the algorithm in the specific implementation method)
A.System setup算法:该算法是由属性权威(即可信方)完成的概率多项式时间算法,算法输入可信方定义的安全参数(安全参数由可信方选取,每次运算的安全参数不同,则产生的主密钥和公开参数不同,比如根据时间选取),输出主密钥和系统公开参数,主密钥由可信方保存,系统公开参数则对外公开,使其他方容易获取(比如公布在官方网站);A. System setup algorithm: This algorithm is a probabilistic polynomial time algorithm completed by the attribute authority (that is, the trusted party). The algorithm inputs the security parameters defined by the trusted party (the security parameters are selected by the trusted party, and the security parameters for each operation are different. , the generated master key is different from the public parameters, such as selected according to time), output the master key and system public parameters, the master key is kept by the trusted party, and the system public parameters are made public, making it easy for other parties to obtain (such as published on the official website);
B.User Grant算法:如图2所示,该算法是由属性权威(即可信方)完成的概率多项式时间算法,算法输入一个用户的属性集(用户的属性集合是用户在可信方注册,可信方通过线下的方式验证得到),主密钥和系统公开参数,算法输出对应属性的私钥,组成属性凭证,并通过可信方与用户之间的秘密信道(比如线下的方式,现场交接等)安全的传送给该用户;同时可信方为用户生成一对公私钥对,并通过安全的信道发送给用户。B. User Grant algorithm: As shown in Figure 2, this algorithm is a probabilistic polynomial time algorithm completed by the attribute authority (that is, the trusted party). The algorithm inputs a user's attribute set (the user's attribute set is the , the trusted party obtains it through offline verification), the master key and system public parameters, and the algorithm outputs the private key corresponding to the attribute to form the attribute certificate, and through the secret channel between the trusted party and the user (such as the offline mode, on-site handover, etc.) to the user securely; at the same time, the trusted party generates a public-private key pair for the user and sends it to the user through a secure channel.
C.User Prove算法:如图3所示,该算法是由用户完成的概率多项式时间算法,用户首先获取可信方发布的公开参数,算法输入系统公开参数(可信方公布)、消息(与所要访问的服务相关的消息)、用户的属性凭证、秘密随机数r(用于生成匿名凭证的私钥),以及目标服务要求访问该服务的用户所需具备的属性条件(比如该服务的用户需要具备所列n个属性中的k个属性,该信息从服务提供方获取),输出匿名凭证,然后将生成的匿名凭证发送给服务提供方;C. User Prove algorithm: As shown in Figure 3, this algorithm is a probabilistic polynomial time algorithm completed by the user. The user first obtains the public parameters released by the trusted party, and the algorithm inputs the system public parameters (published by the trusted party), messages (and The message related to the service to be accessed), the user's attribute certificate, the secret random number r (the private key used to generate the anonymous certificate), and the attribute conditions required by the target service to access the user of the service (such as the user of the service Need to have k attributes among the listed n attributes, the information is obtained from the service provider), output the anonymous credential, and then send the generated anonymous credential to the service provider;
D.User Verify算法:如图4所示,该算法是由验证者即服务提供方完成的确定性多项式时间算法,服务提供方首先获取可信方公布的公开参数,当需要对用户的访问资格进行验证时,调用该算法,输入为系统公开参数、消息(与用户所要访问的服务的相关消息)、属性条件(比如该服务的用户需要具备所列n个属性中的k个属性)以及匿名凭证,根据UserVerify算法(具体实施方案中详细描述算法)进行验证,并输出判断值“接受”或者“拒绝”。D. User Verify algorithm: As shown in Figure 4, this algorithm is a deterministic polynomial time algorithm completed by the verifier, that is, the service provider. The service provider first obtains the public parameters announced by the trusted party. When performing verification, the algorithm is called, and the input is system public parameters, message (related to the service the user wants to access), attribute conditions (for example, the user of the service needs to have k attributes among the listed n attributes) and anonymous Credentials are verified according to the UserVerify algorithm (the algorithm is described in detail in the specific implementation plan), and the judgment value "accept" or "reject" is output.
二、基于属性的匿名认证系统2. Attribute-based anonymous authentication system
系统主要的参与方由可信方(Trust Provider,TP),用户代理(User Agent,UA)(用户通过用户代理与可信方及服务提供方进行交互),以及服务提供方(Service Provider,SP)三部分,其中可信方TP会对用户属性进行审核,并负责为用户颁发属性凭证;用户代理UA代表用户进行相应的计算,包括用户属性的映射,属性凭证计算,凭证证明计算等。服务提供方SP会定义访问其服务用户所需要具备的属性,获取用户的属性凭证,验证用户的凭证等操作。The main participants in the system are Trust Provider (TP), User Agent (User Agent, UA) (users interact with Trusted Party and Service Provider through User Agent), and Service Provider (Service Provider, SP ) three parts, in which the trusted party TP will review user attributes and is responsible for issuing attribute certificates for users; user agent UA performs corresponding calculations on behalf of users, including user attribute mapping, attribute certificate calculation, certificate proof calculation, etc. The service provider SP will define the attributes required to access its service users, obtain the user's attribute credentials, verify the user's credentials, and other operations.
其构架如图1中所示,图中为一个TP,一个用户U(用户通过UA与TP或SP通信),一个服务提供方SP,应用过程中必然是多个用户U,多个服务提供方SP,当然也可以存在多个可信方TP。系统的主要组成:凭证签发服务,用户代理插件,应用服务三大部分。各部分的主要组成如下:Its structure is shown in Figure 1. In the figure, there is one TP, one user U (the user communicates with TP or SP through UA), and one service provider SP. In the application process, there must be multiple users U, multiple service providers SP, of course, there may also be multiple trusted parties TP. The main components of the system are three parts: certificate issuance service, user agent plug-in, and application service. The main components of each part are as follows:
A.凭证签发服务A. Credential Issuance Service
●用户身份验证●User authentication
●凭证签发●Certificate issuance
B.用户代理插件B. User Agent Plugins
●凭证请求●Certificate request
●凭证管理●Voucher management
●凭证出示●Voucher presentation
C.应用服务C. Application service
●策略管理●Strategy management
●凭证验证● Credential verification
凭证签发服务运行在可信方TP端,其中用户身份验证功能,使用公钥加密技术,确认用户有合法的公私密钥对(公私钥对由可信机构比如公安局,根据用户的身份为用户生成),验证用户的合法性;凭证签发功能是在用户向可信方提交属性,并提出属性凭证请求,由可信方对用户所申请的属性进行行政上的审核与验证,验证通过之后,为用户签发对应的属性凭证,该属性凭证是对用户经过认证的属性进行的处理,可以用来进行加密操作。The certificate issuance service runs on the TP end of the trusted party, where the user identity verification function uses public key encryption technology to confirm that the user has a legal public-private key pair (the public-private key pair is provided by a trusted organization such as the Public Security Bureau for the user according to the user's identity. Generate) to verify the legitimacy of the user; the certificate issuance function is to submit attributes to the trusted party when the user submits an attribute certificate request, and the trusted party will conduct administrative review and verification of the attributes applied by the user. After the verification is passed, Issue the corresponding attribute certificate for the user, which is the processing of the authenticated attribute of the user and can be used for encryption operations.
用户代理插件运行在用户端,代表用户完成一些复杂的运算以及匹配。它首先会将用户提交的申请认证的属性分配一个属性标识(分配方法首先由TP规定,并使得其他方容易获取,目的是将属性转换为可以进行加密操作的整数,比如将“age=1”映射为“1”),代替用户向可信方提出属性凭证的申请请求,将用户要申请的属性对应的值发送给TP。凭证管理功能,是将用户所有已经申请到的属性凭证维护一个列表,执行对属性凭证的查找,添加,删除,替换等操作。凭证出示功能是在获取到服务提供方SP要求提供的属性之后,挑选出相应的属性凭证,根据SP的要求对凭证的内容进行选择性隐藏属性计算后,作为一个匿名凭证出示给服务提供方。当对服务提供方发出的挑战(随机数挑战)后根据挑战值的不同计算响应值,向SP证明用户拥有隐藏的属性。The user agent plug-in runs on the user side and completes some complex calculations and matching on behalf of the user. It first assigns an attribute identifier to the attribute submitted by the user for authentication (the assignment method is first specified by the TP, and makes it easy for other parties to obtain it. The purpose is to convert the attribute into an integer that can be encrypted, such as "age=1" is mapped to "1"), instead of the user submitting an application request for an attribute certificate to the trusted party, the value corresponding to the attribute to be applied by the user is sent to the TP. The credential management function is to maintain a list of all attribute certificates that the user has applied for, and perform operations such as searching, adding, deleting, and replacing attribute certificates. The credential presentation function is to select the corresponding attribute credential after obtaining the attributes required by the service provider SP, and to present the credential as an anonymous credential to the service provider after performing selective hidden attribute calculation on the credential content according to the requirements of the SP. After the challenge (random number challenge) issued by the service provider, the response value is calculated according to the difference of the challenge value, which proves to the SP that the user has hidden attributes.
应用服务主要是SP端,策略管理功能,主要是维护访问服务所需要的属性策略;凭证验证是对用户端发送过来的属性凭证,根据对应服务的访问策略(服务不同,访问策略不同,均保存在SP端),以及TP公开参数对进行验证,(具体的验证算法在实施方案中详细说明),判断是否满足访问策略的要求。若通过验证,则用户通过该服务的认证。The application service is mainly the SP side, and the policy management function is mainly to maintain the attribute policy required for accessing the service; the credential verification is the attribute credential sent from the client, according to the access policy of the corresponding service (the service is different, the access policy is different, all are saved) At the SP side), and TP public parameters are verified (the specific verification algorithm is detailed in the implementation plan), and it is judged whether the requirements of the access policy are met. If verified, the user is authenticated by the service.
与现有技术相比,本发明的优势主要体现在:Compared with the prior art, the advantages of the present invention are mainly reflected in:
1)采用基于属性签名的匿名凭证算法,与现有通用匿名凭证系统相比,用户可以选择性隐藏属性,以可支持更灵活的门限属性选择性出示方案。1) Using an attribute signature-based anonymous credential algorithm, compared with the existing general anonymous credential system, users can selectively hide attributes to support a more flexible threshold attribute selective presentation scheme.
2)本发明中的属性签名长度为常数,因此匿名认证协议传输的消息长度为常数,提高了协议的通信效率。2) The length of the attribute signature in the present invention is constant, so the length of the message transmitted by the anonymous authentication protocol is constant, which improves the communication efficiency of the protocol.
3)在保证隐私性的同时,使用基于属性的签名技术保证了凭证的不可伪造性和不可出借性质,为实现用户为中心的高隐私高安全性的认证与访问控制过程提供了保证。3) While ensuring privacy, the use of attribute-based signature technology ensures the unforgeability and non-lending properties of credentials, which provides a guarantee for the realization of user-centered authentication and access control processes with high privacy and high security.
4)对基于属性匿名凭证方案中具体算法实现与框架相对独立,可在统一框架下进行便捷的扩展,从而支持更多种类的算法。4) The implementation of specific algorithms in the attribute-based anonymous credential scheme is relatively independent from the framework, and can be conveniently expanded under a unified framework to support more types of algorithms.
5)不可连接性性,就是说服务或者多个服务一起将用户的活动关联起来是计算困难的,也就是说一个用户无论它访问一个服务多少次,都将保持匿名性。5) Non-connectability, which means that it is computationally difficult for a service or multiple services to associate a user's activities together, that is to say, a user will remain anonymous no matter how many times he visits a service.
6)最小特权,服务或者多个服务一起计算用户除该服务所需属性以外的属性是困难的。也就是说,每次认证用户的过程,服务只能获取该会话需要并且用户授权出示的属性,而不能获取用户的其他属性信息。6) Least privilege, it is difficult for a service or multiple services to calculate user attributes other than those required by the service. That is to say, during each user authentication process, the service can only obtain the attributes required by the session and authorized by the user, but not other attribute information of the user.
附图说明Description of drawings
图1匿名凭证体系结构图;Figure 1 Anonymous credential architecture diagram;
图2匿名认证系统凭证签发协议;Figure 2 Anonymous Authentication System Credential Issuance Protocol;
图3匿名认证系统凭证出示协议;Figure 3 Anonymous authentication system credential presentation protocol;
图4匿名认证系统模块及接口。Figure 4 Anonymous authentication system modules and interfaces.
具体实施方式Detailed ways
下面通过具体实施例对本发明作更详细的说明。其中实施例1给出为该系统所涉及的基于属性签名的匿名凭证算法,实施例2给出匿名凭证系统的具体运作方式。The present invention will be described in more detail below by specific examples. Among them, embodiment 1 provides the anonymous credential algorithm based on attribute signature involved in the system, and embodiment 2 provides the specific operation mode of the anonymous credential system.
实施例1.基于属性的匿名认证算法Example 1. Attribute-based anonymous authentication algorithm
下面给出一个本发明的基于属性的签名算法的具体实例:A specific example of the attribute-based signature algorithm of the present invention is given below:
设和是阶为p的素数阶循环群(t用来表示,说明和是两个不同的群,即本发明需要设定两个群,用角标t来区分两个不同的素数阶循环群),g为的生成元。为到上的双线性映射。set up and is a cyclic group of prime number order with order p (t is used to denote ,illustrate and are two different groups, that is, the present invention needs to set two groups, and use subscript t to distinguish two different prime order cyclic groups), and g is generator of . for arrive bilinear map on .
A.System setup算法A. System setup algorithm
该算法由可信方执行,首先定义凭证中可包含的最大属性个数n,然后为每个可能用到的用户属性i分配属性值ωi(根据预先定义的分配方式),并另外选择n-1个冗余属性dj组成冗余属性集D,(冗余属性的分配需要保证不会与用户属性重复,如果将要构造凭证中的用户属性不足n个时,可信方会选择冗余属性来补充至n个),这些冗余属性不会被颁发给任何用户。接下来随机选择中生成元g,h,随机选择作为私钥,即主密钥,计算作为系统的公共参数的一部分,则方案TP最后生成公共参数为
B.User Grant算法B. User Grant Algorithm
当用户U申请与属性集合ΩU∈Ω的属性凭证时(其中Ω为所有属性的集合,ΩU为用户属性集合),TP执行以下操作:When user U applies for an attribute certificate with attribute set Ω U ∈ Ω (where Ω is the set of all attributes, Ω U is the set of user attributes), TP performs the following operations:
首先检验 check first
若否,则拒绝执行,也就是说当用户申请时提交的属性中包含冗余属性,则拒绝执行。If not, the execution is refused, that is to say, when the attributes submitted by the user include redundant attributes, the execution is refused.
若交集为空,则TP随机选择一生成元,然后对ΩU中第i个属性的属性值ωUi(对每个属性都计算),计算中间值计算输出属性凭证cre={gU,{Ui}(ωUi∈ΩU)}。If the intersection is empty, TP randomly selects a generator , and then for the attribute value ω Ui of the i-th attribute in Ω U (calculated for each attribute), calculate the intermediate value The calculation output attribute credential cre={g U , {U i }(ω Ui ∈Ω U )}.
C.User Prove算法C. User Prove Algorithm
当用户要访问一项服务时,需要证明其拥有的属性满足SP所定义的对应于该服务的策略,此处的策略为门限策略,即一个应用服务用户属性必须满足:与属性集A中的k个属性中的至少t个属性一致,即Γ=(t,A)(1≤t≤k=|A|≤n,|A|∩ΩU|≥t),用户代理UA从其属性集合中选择一个能够满足SP策略的属性子集然后选择集合D={di}中的前n+t-k-1个元素,将这些元素的集合记为Dn+t-k-1。用户可使用其凭证cre中的Ui计算(每个属性在cre中都有一个Ui值,对应每个属性的凭证值):When a user wants to access a service, it needs to prove that the attributes it owns meet the policy defined by the SP corresponding to the service. The policy here is a threshold policy, that is, an application service user attribute must satisfy: the same as in attribute set A At least t attributes among the k attributes are consistent, that is, Γ=(t, A) (1≤t≤k=|A|≤n, |A|∩Ω U |≥t), the user agent UA starts from its attribute set Select a subset of attributes that can satisfy the SP strategy Then select the first n+tk-1 elements in the set D={d i }, and record the set of these elements as D n+tk-1 . Users can use the U i in their credential to calculate (each attribute has a U i value in cre, corresponding to the credential value of each attribute):
接下来,由于|Dn+t-k-1∩(A-Ω′U)|=(n+t-k-1)+(k-t)=n-1,因此用户可使用
D.User Verify算法D. User Verify Algorithm
验证者SP获取(π1,π2,π3,π4)后,首先确认gU=π4是否成立,(gU是用户匿名凭证中的第一个元素,π4是C步骤中的UA发送给SP的匿名证据中的最后一个元素),若是,则说明该匿名凭证的用户属于已签发凭证的用户集合,则使用计算并验证:以及e(h,π2)=e(g,π3)是否成立,若成立,则说明用户所拥有的属性满足门限策略Γ。After the verifier SP obtains (π 1 , π 2 , π 3 , π 4 ), it first confirms whether g U = π 4 is established, (g U is the first element in the user’s anonymous credential, and π 4 is the The last element in the anonymous evidence sent by the UA to the SP), if it is true, it means that the user of the anonymous certificate belongs to the set of users who have issued the certificate, then use calculate and verify: And whether e(h, π 2 )=e(g, π 3 ) is established, if it is established, it means that the attributes owned by the user satisfy the threshold policy Γ.
实施例2.基于属性的匿名认证系统Example 2. Attribute-based anonymous authentication system
本实施例旨在提供本发明基于属性的匿名认证系统的一个具体实例。This embodiment aims to provide a specific example of the attribute-based anonymous authentication system of the present invention.
该系统包含三个主体:可信方(Trust Provider,TP),用户代理(User Agent,UA),以及服务提供方(Service Provider,SP)三部分。三部分之间通过网络连接,可信方负责认证用户,并为用户颁发属性凭证。用户方的主要工作由用户代理来完成,主要是属性凭证接收,存储,查询,以及产生验证断言,协助完成应用服务提供方的验证。用户在请求服务之前需要向可信方申请属性凭证,请求服务的时候只需要出示该应用服务提供方需要被认证的属性,比如网游公司仅需要用户证明年龄大于法定年龄,国别属于指定的国家等。服务提供方对用户出示的属性进行验证,验证通过则给予相应的访问权限。The system consists of three main bodies: Trust Provider (TP), User Agent (User Agent, UA), and Service Provider (Service Provider, SP). The three parts are connected through the network, and the trusted party is responsible for authenticating users and issuing attribute certificates for users. The main work of the user side is completed by the user agent, mainly receiving, storing, querying attribute credentials, and generating verification assertions to assist in the verification of the application service provider. Before requesting services, users need to apply for attribute certificates from trusted parties. When requesting services, they only need to show the attributes that the application service provider needs to be authenticated. For example, online game companies only need users to prove that they are older than the legal age and that their country belongs to a specified country. wait. The service provider verifies the attributes presented by the user, and grants the corresponding access rights if the verification passes.
具体的实施过程为四段:系统初始化,凭证签发协议,凭证出示协议以及凭证验证协议。系统初始化过程为协议的运行产生必须的公共参数。凭证签发过程主要有可信方TP和用户共同协商完成。凭证出示协议由用户与服务提供方SP共同完成。The specific implementation process is divided into four sections: system initialization, certificate issuance protocol, certificate presentation protocol and certificate verification protocol. The system initialization process generates necessary public parameters for the operation of the protocol. The credential issuance process is mainly completed through negotiation between the trusted party TP and the user. The certificate presenting agreement is completed jointly by the user and the service provider SP.
本实施例基于如下的情景设定:用户U获取可信方TP颁发的属性凭证后,访问应用提供方SP的资源,SP指定访问策略Γ,若U满足该访问策略则允许用户访问,具体过程如下:This embodiment is based on the following scenario setting: after the user U obtains the attribute certificate issued by the trusted party TP, he accesses the resources of the application provider SP, and the SP specifies an access policy Γ, and if U satisfies the access policy, the user is allowed to access. The specific process as follows:
1)TP运行实施例1中的setup算法,保存生成的主密钥,并将系统公开参数以其他方容易获取的方式发布出来1) TP runs the setup algorithm in Example 1, saves the generated master key, and publishes the system public parameters in a way that other parties can easily obtain
2)用户U通过用户代理UA向TP发起属性凭证签发请求,即注册提交属性;2) User U initiates an attribute certificate issuance request to TP through user agent UA, that is, registers and submits attributes;
3)TP与U执行认证协议,验证用户所拥有的属性,并根据U的属性、主密钥x和系统公开参数为其颁发属性凭证cre;3) TP and U execute the authentication protocol, verify the attributes owned by the user, and issue the attribute certificate cre to U according to U's attributes, master key x and system public parameters;
4)用户U通过用户代理UA向服务提供方SP发起访问请求,包含所要访问的服务的标识;4) The user U initiates an access request to the service provider SP through the user agent UA, including the identifier of the service to be accessed;
5)应用服务提供方SP查找用户访问的资源所需的访问策略(策略是预先定制好的,且不同的服务所需的策略不同,此处SP只需查找对应的策略,),并返回给用户U的代理UA;5) The application service provider SP searches for the access policy required by the resource accessed by the user (the policy is pre-customized, and different services require different policies, here the SP only needs to find the corresponding policy), and returns it to User U's proxy UA;
6)用户代理提示用户U选择要使用的属性,用户根据该属性使用自身的属性凭证和一用于生成匿名凭证的私钥r计算匿名凭证(是对TP颁发的属性凭证进行处理,使得SP能解密目标服务所要求的属性,而不能得到属性凭证中的其他属性的具体值,但是可以知道已经得到TP认证,具体的算法在实例1中C算法),并通过用户代理发送给SP;6) The user agent prompts the user U to select the attribute to be used, and the user uses his own attribute certificate and a private key r used to generate the anonymous certificate to calculate the anonymous certificate according to the attribute (the attribute certificate issued by the TP is processed so that the SP can Decrypt the attributes required by the target service, but cannot get the specific values of other attributes in the attribute certificate, but you can know that it has been authenticated by the TP, and the specific algorithm is in the C algorithm in Example 1), and send it to the SP through the user agent;
7)应用服务提供方SP验证用户的匿名证明,若验证通过并满足该访问策略,则将资源返回给用户(具体的算法在实例1中D算法)。7) The application service provider SP verifies the user's anonymous certificate, and if the verification passes and satisfies the access policy, the resource is returned to the user (the specific algorithm is in the D algorithm in Example 1).
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310148635.1A CN104125199B (en) | 2013-04-25 | 2013-04-25 | A kind of anonymous authentication method and system based on attribute |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310148635.1A CN104125199B (en) | 2013-04-25 | 2013-04-25 | A kind of anonymous authentication method and system based on attribute |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104125199A true CN104125199A (en) | 2014-10-29 |
CN104125199B CN104125199B (en) | 2019-04-02 |
Family
ID=51770465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310148635.1A Expired - Fee Related CN104125199B (en) | 2013-04-25 | 2013-04-25 | A kind of anonymous authentication method and system based on attribute |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104125199B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106533681A (en) * | 2015-09-11 | 2017-03-22 | 中国科学院软件研究所 | Attribute attestation method and system supporting partial presentation |
CN107959931A (en) * | 2017-12-18 | 2018-04-24 | 中国人民解放军战略支援部队信息工程大学 | Wireless network anonymous switching method, apparatus and system based on attribute signature |
CN108769020A (en) * | 2018-05-29 | 2018-11-06 | 东北大学 | A kind of the identity attribute proof system and method for secret protection |
CN108833373A (en) * | 2018-05-29 | 2018-11-16 | 东北大学 | Instant messaging and anonymous access methods for relational privacy-preserving social networks |
CN109450916A (en) * | 2018-11-28 | 2019-03-08 | 济南浪潮高新科技投资发展有限公司 | A kind of authentication attribute identification protocol system based on eID |
CN109995757A (en) * | 2013-12-05 | 2019-07-09 | 德国邮政股份公司 | Access control system |
CN112600851A (en) * | 2020-12-21 | 2021-04-02 | 暨南大学 | Link traceable anonymous authentication method for event |
CN112614545A (en) * | 2020-12-29 | 2021-04-06 | 暨南大学 | Gene sequence safety comparison method and system supporting multi-attribute anonymous authentication |
CN113743926A (en) * | 2021-08-26 | 2021-12-03 | 如般量子科技有限公司 | Anonymous communication and charging system and method based on chargeable ID |
CN114169011A (en) * | 2021-12-16 | 2022-03-11 | 福州大学 | Privacy-protected electronic bill system based on attribute certificate |
WO2022160829A1 (en) * | 2021-01-26 | 2022-08-04 | 华为云计算技术有限公司 | Identity information processing method, device, and system |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20230104852A1 (en) * | 2021-10-01 | 2023-04-06 | Changefly Inc. | Anonymous authentication system and methods for obscuring authentication information in networked computing systems |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143695A1 (en) * | 2004-12-27 | 2006-06-29 | Amiram Grynberg | Anonymous Spoof resistant authentication and enrollment methods |
CN101977380A (en) * | 2010-11-15 | 2011-02-16 | 天津工业大学 | Wireless Mesh network identification method |
US20120060028A1 (en) * | 2009-05-29 | 2012-03-08 | Jun Furukawa | Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor |
CN102685092A (en) * | 2011-11-29 | 2012-09-19 | 河海大学 | Remote proofing method for proofing security attribute of remote platform |
-
2013
- 2013-04-25 CN CN201310148635.1A patent/CN104125199B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143695A1 (en) * | 2004-12-27 | 2006-06-29 | Amiram Grynberg | Anonymous Spoof resistant authentication and enrollment methods |
US20120060028A1 (en) * | 2009-05-29 | 2012-03-08 | Jun Furukawa | Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor |
CN101977380A (en) * | 2010-11-15 | 2011-02-16 | 天津工业大学 | Wireless Mesh network identification method |
CN102685092A (en) * | 2011-11-29 | 2012-09-19 | 河海大学 | Remote proofing method for proofing security attribute of remote platform |
Non-Patent Citations (2)
Title |
---|
张严等: "匿名凭证方案研究进展", 《信息网络安全》 * |
贺靖靖等: "基于PMI属性证书的匿名认证方案", 《计算机安全》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995757A (en) * | 2013-12-05 | 2019-07-09 | 德国邮政股份公司 | Access control system |
CN109995757B (en) * | 2013-12-05 | 2021-11-16 | 德国邮政股份公司 | Access control system |
CN106533681B (en) * | 2015-09-11 | 2019-09-17 | 中国科学院软件研究所 | A kind of attribute method of proof and system that support section is shown |
CN106533681A (en) * | 2015-09-11 | 2017-03-22 | 中国科学院软件研究所 | Attribute attestation method and system supporting partial presentation |
CN107959931A (en) * | 2017-12-18 | 2018-04-24 | 中国人民解放军战略支援部队信息工程大学 | Wireless network anonymous switching method, apparatus and system based on attribute signature |
CN108769020B (en) * | 2018-05-29 | 2021-07-13 | 东北大学 | A privacy-preserving identity attribute certification system and method |
CN108769020A (en) * | 2018-05-29 | 2018-11-06 | 东北大学 | A kind of the identity attribute proof system and method for secret protection |
CN108833373A (en) * | 2018-05-29 | 2018-11-16 | 东北大学 | Instant messaging and anonymous access methods for relational privacy-preserving social networks |
CN108833373B (en) * | 2018-05-29 | 2021-03-16 | 东北大学 | An instant communication and anonymous access method for relational privacy-preserving social networks |
CN109450916A (en) * | 2018-11-28 | 2019-03-08 | 济南浪潮高新科技投资发展有限公司 | A kind of authentication attribute identification protocol system based on eID |
CN112600851A (en) * | 2020-12-21 | 2021-04-02 | 暨南大学 | Link traceable anonymous authentication method for event |
CN112600851B (en) * | 2020-12-21 | 2022-05-03 | 暨南大学 | Event-Oriented Linkable Traceable Anonymous Authentication Method |
CN112614545A (en) * | 2020-12-29 | 2021-04-06 | 暨南大学 | Gene sequence safety comparison method and system supporting multi-attribute anonymous authentication |
WO2022160829A1 (en) * | 2021-01-26 | 2022-08-04 | 华为云计算技术有限公司 | Identity information processing method, device, and system |
CN113743926A (en) * | 2021-08-26 | 2021-12-03 | 如般量子科技有限公司 | Anonymous communication and charging system and method based on chargeable ID |
CN113743926B (en) * | 2021-08-26 | 2024-04-12 | 如般量子科技有限公司 | Anonymous communication and charging system and method based on chargeable ID |
CN114169011A (en) * | 2021-12-16 | 2022-03-11 | 福州大学 | Privacy-protected electronic bill system based on attribute certificate |
CN114169011B (en) * | 2021-12-16 | 2024-06-04 | 福州大学 | Privacy protection electronic bill system based on attribute certificates |
Also Published As
Publication number | Publication date |
---|---|
CN104125199B (en) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104125199B (en) | A kind of anonymous authentication method and system based on attribute | |
CN103856477B (en) | A kind of credible accounting system and corresponding authentication method and equipment | |
US9768962B2 (en) | Minimal disclosure credential verification and revocation | |
US10623398B2 (en) | Verifying requests for access to a service provider using an authentication component | |
US9621341B2 (en) | Anonymous verifiable public key certificates | |
Velliangiri et al. | An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography | |
US20140281491A1 (en) | Identity escrow management for minimal disclosure credentials | |
US20190349203A1 (en) | Mediated anonymity for permissioned, distributed-ledger networks | |
CN105187405B (en) | Cloud computing identity management method based on prestige | |
US20100229241A1 (en) | Method of accessing service, device and system thereof | |
CN106992988B (en) | A cross-domain anonymous resource sharing platform and its implementation method | |
CN105516201A (en) | Lightweight anonymous authentication and key negotiation method in multi-server environment | |
WO2021120615A1 (en) | Encryption apparatus, encryption system and data encryption method | |
Gao et al. | A Privacy‐Preserving Identity Authentication Scheme Based on the Blockchain | |
CN101834853A (en) | Anonymous resource sharing method and system | |
Zhuang et al. | BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property | |
CN105516119A (en) | Cross-domain identity authentication method based on proxy re-signature | |
Asghar et al. | PRIMA: Privacy-preserving identity and access management at internet-scale | |
CN109902508A (en) | An anonymous entity identification method and system for certificate issuer | |
CN103888468A (en) | Privacy protection method based on trusted third party attribute fuzzy grouping under cloud environment | |
Shahraki et al. | Attribute-based data access control for multi-authority system | |
KR102157695B1 (en) | Method for Establishing Anonymous Digital Identity | |
CN102665205B (en) | Access control method for protecting access privacy of user in mobile value-added service system | |
Thomas et al. | Single sign-on in cloud federation using cloudsim | |
Paquin | U-prove technology overview v1. 1 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190402 Termination date: 20210425 |
|
CF01 | Termination of patent right due to non-payment of annual fee |