1 Introduction
2 Preliminaries
2.1 Bilinear pairings
2.2 Hard problems and security assumptions
2.3 Certificate-based signature
3 Identity-based proxy group signature
4 Anonymous access authentication scheme
4.1 Proxy-based hierarchical network architecture
Notations | Explanations |
---|---|
ID
A
| Identity of entity A |
TS | Current time stamp |
A → B {M} | Entity A sends message M to entity B |
SIGN_ALG(M) | Use ALG to sign M |
MSK
i
| Master key of group i
|
PK
A
/SK
A
| Entity A’s public/private key pair |
ENCR_ALG_PK(M) | Use ALG to encrypt M with public key PK |
A\({_{ALG\_.PK/SK}}\)
| Entity A’s public/private key pair in ALG |
CERT_A_WMN
i
| A’s certificate at WMN group i
|
M 1∥ M2
| Concatention of M1 and M2
|
Auth
A
| Entity A’s warrant for proxy signature |
K
A−B
| Shared key between A and B |
SE
K
(M) | Encrypt M with shared key K |