Method and system for sharing anonymous resource

A resource sharing and resource technology, applied in the field of computer information, can solve problems such as increasing server burden, unknown threats, and leaking user personal information.

Inactive Publication Date: 2010-09-15
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the use of pseudonym mapping can avoid the above situation to a certain extent, but it still cannot prevent the resource server from destroying the user's privacy
[0004] At present, there are already some research projects that focus on technologies related to anonymous authentication, including the shibboleth project organized by Oasis and the Liberty project of the Liberty Alliance. Obtain the user's personal information, thereby protecting the user's personal privacy, but there is no restriction on the resource server. The server can know all the user's information during authentication. If the server is dishonest or attacked, it will leak the user's personal information. information that may pose an unknown threat
In addition, the server generally needs to save and understand all the information of the resources. If the server is attacked, the information of the resources will be leaked, and the server needs to manage the access control of the resources, which increases the burden on the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for sharing anonymous resource
  • Method and system for sharing anonymous resource
  • Method and system for sharing anonymous resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Example 1. Anonymous authentication method

specific example

[0056] a. When the anonymous authentication system is established, the authentication server generates and publishes system parameters (q, G, G, g, g, e), where g, g are the generators of the group G and G respectively, and the order of the group is q, e It is a bilinear map e: G×G→G.

[0057] b. The authentication server chooses its private key x,y∈Zq, and generates its public key X=g x , Y=g y , the Zq represents an integer group of order q.

[0058] c. When the authenticator registers with the authentication server, randomly select t∈Zq and send C=g t To the authentication server, the server randomly selects α∈Zq, and calculates a=g α , and use its private key to generate an anonymous credential σ=(a, a y , a x C αxy ), denoted as (a, b, c), the authentication server sends σ to the authenticator.

[0059] d. When the authenticator performs authentication, the authenticator uses its anonymous credential σ and a random number s=(s 1 ,s 2 ) to generate a blinded signa...

Embodiment 2

[0065] Embodiment 2. Resource sharing method and system

[0066] This embodiment aims to provide a specific example of the resource sharing method and system of the present invention.

[0067] This embodiment is based on the following scenario setting: users A and B have registered on the resource server S, A wishes to publish resources through the resource server and restricts the attributes that users who obtain the resources should have, and B wishes to obtain the resources released by A and verify Properties that its publisher has. Therefore, in this setting, user A (or the computer client where user A is located) is the resource publisher, and user B (or the computer client where user B is located) is the resource acquirer.

[0068] The process for user A to publish resources is as follows: image 3 As shown, the specific content is as follows:

[0069] 1. Client A accesses server S and submits a resource publishing request. After obtaining the request, S calls the AAC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for sharing an anonymous resource, which belong to the technical field of computer information. The method for sharing the resource comprises the following steps that: a resource provider initiates a resource publishing request to a resource management server; the resource management server performs an anonymous authentication on the request; the resource provider generates a resource acquisition strategy, uses the resource acquisition strategy as a cipher key to encrypt the resource, and sends the acquisition strategy and the encrypted resource to the resource management server; the resource management server stores a binary group and releases resource description information; a resource acquirer retrieves the resource description information and initiates a resource acquisition request; the resource management server performs the anonymous authentication on the resource acquirer; and the resource acquirer acquires and decrypts the resource after acquiring a strategy verification. The invention also discloses a system sharing the resource, which corresponds to the method. The method and the system can be used for computer information technical application such as network resource sharing and the like.

Description

technical field [0001] The invention relates to resource sharing, in particular to an anonymous authentication method, an anonymous resource sharing method and a system. It belongs to the field of computer information technology. Background technique [0002] The development of network technology enables the comprehensive sharing of information resources, bringing people a new mode of knowledge acquisition, but also triggers new security issues, such as information leakage in the process of resource sharing. With the increasing number of network activities, people pay more and more attention to personal privacy. It is an inevitable trend to use anonymous authentication and anonymous communication to protect the privacy of most network activities. The core idea of ​​anonymous authentication is to separate qualification authentication from identity identification in the authentication process, that is, in the authentication process, the verifier can only verify the relevant a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 冯登国张立武张严李强王鹏翩
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products