作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2025, Vol. 51 ›› Issue (2): 159-169. doi: 10.19678/j.issn.1000-3428.0069422

• 网络空间安全 • 上一篇    下一篇

支持黑名单的去中心化k次匿名属性认证

陶静怡1,2, 彭凌祺3, 阚海斌1,2,4,*()   

  1. 1. 复旦大学计算机科学技术学院, 上海 200433
    2. 上海市区块链工程技术研究中心复旦-众安区块链与信息安全联合实验室, 上海 200433
    3. 上海华虹计通智能系统股份有限公司, 上海 201206
    4. 复旦大学义乌研究院, 浙江 义乌 322000
  • 收稿日期:2024-02-26 出版日期:2025-02-15 发布日期:2024-08-05
  • 通讯作者: 阚海斌
  • 基金资助:
    国家重点研发计划(2019YFB2101703); 国家自然科学基金(62272107); 国家自然科学基金(62302129); 上海市科技创新行动计划(21511102200); 广东省重点研发计划(2020B0101090001); 海南省重点研发项目(ZDYF2024GXJS030)

Decentralized k-Times Anonymous Attribute Authentication Supporting Blacklist

TAO Jingyi1,2, PENG Lingqi3, KAN Haibin1,2,4,*()   

  1. 1. School of Computer Science, Fudan University, Shanghai 200433, China
    2. Fudan-Zhongan Joint Laboratory of Blockchain and Information Security, Shanghai Engineering Research Center of Blockchain, Shanghai 200433, China
    3. Shanghai Huahong Jitong Smart System Co., Ltd., Shanghai 201206, China
    4. Yiwu Research Institute, Fudan University, Yiwu 322000, Zhejiang, China
  • Received:2024-02-26 Online:2025-02-15 Published:2024-08-05
  • Contact: KAN Haibin

摘要:

随着云计算和数据服务的普及, 人们对隐私保护和数据安全的需求日益迫切。传统的匿名认证方案可以保护用户的隐私, 但是在对用户的访问控制方面存在不足, 而现有的k次匿名属性认证方案无法对恶意用户问责。为了在保护用户隐私的同时对用户进行访问控制和问责, 提出一种支持黑名单的去中心化k次匿名属性认证方案, 旨在使服务提供商能够对用户进行细粒度访问控制并限制其访问次数, 同时能够阻止黑名单中的恶意用户再次访问服务。该方案利用去中心化属性加密与非交互式零知识证明技术, 使得用户能够以匿名的方式认证其属性, 同时还能证明其访问服务的次数没有超过阈值。为了在实现匿名性的同时对恶意用户问责, 设计黑名单机制, 利用无陷门累加器技术加快了黑名单管理和认证的过程, 提高了方案的效率。此外, 通过结合去中心化属性密码和区块链技术, 该方案还具有去中心化的特性。实验结果表明, 该方案的安全模型满足抗误验证性和匿名性, 在实际应用中具有一定的可行性和实用性。

关键词: 区块链, 属性密码, 零知识证明, 黑名单, 匿名认证, 累加器

Abstract:

As cloud computing and data services become increasingly prevalent, the demand for privacy protection and data security has increased. Traditional anonymous authentication schemes can safeguard user privacy but often lack effective user access control. Existing k-times anonymous attribute-based authentication schemes also lack mechanisms for holding malicious users accountable. To address these issues while protecting user privacy, this study proposes a decentralized, blacklistable k-times attribute-based anonymous authentication scheme. This scheme enables service providers to implement fine-grained access control and restrict the number of times users can access the service. It also prevents blacklisted malicious users from regaining access. The scheme utilizes decentralized attribute-based encryption and non-interactive zero-knowledge proofs to enable users to authenticate their attributes anonymously while ensuring that their access frequency does not exceed a specified limit. To ensure anonymity and accountability for malicious users, the scheme incorporates a blacklisting mechanism. The use of the trapdoorless accumulator technique enhances the efficiency of both blacklist management and authentication processes. In addition, by integrating decentralized attribute-based cryptography with blockchain technology, the scheme achieves decentralized characteristics. Experimental results show that the security model of this scheme effectively resists misauthentication and preserves anonymity, and has certain feasibility and practicality in practical applications.

Key words: blockchain, attributed-based encryption, zero-knowledge proof, blacklist, anonymous authentication, accumulator