高级检索

    基于SM2的去中心化匿名凭证方案

    SM2-Based Decentralized Anonymous Credential Scheme

    • 摘要: 匿名凭证是一种在不透露持有者身份的前提下验证其资格或属性的隐私保护认证方式,广泛应用于数字身份管理系统、电子政务和数字银行等领域. 符合国家商用密码标准的匿名凭证也备受关注. 然而,现行匿名凭证方案多依赖于中心化的发行机构,这不仅限制了其在去中心化网络中的应用,还易因单点故障导致系统瘫痪和隐私泄露. 为解决上述问题,提出了一种基于SM2商用密码的去中心化匿名凭证方案. 该方案利用区块链网络替代传统凭证发行机构,通过零知识证明方案确保凭证分发的安全可靠. 此外,该方案还允许用户根据需求选择性地披露属性,从而有效避免隐私信息的过度泄露. 还探讨了国密化零知识证明方案的构造方法,并提出了基于SM2的集合成员关系证明方案,为SM2去中心化匿名凭证的设计提供了构造基础. 安全性分析表明,基于SM2的去中心化匿名凭证方案满足不可伪造性和匿名性需求. 性能实验进一步显示,该方案具备实际部署所需的效率.

       

      Abstract: Anonymous credentials are a privacy-preserving authentication method that verifies the holder's qualifications or attributes without revealing their identity, widely used in digital identity management, e-government, and digital banking. Anonymous credentials that comply with Chinese commercial cryptography standards have also garnered significant attention. However, existing anonymous credential schemes often depend on centralized issuing authorities, which not only restrict their applicability in decentralized networks but also introduce risks of system failures and privacy breaches caused by single points of failure. To address these issues, we propose a decentralized anonymous credential scheme based on SM2 commercial cryptography. The proposed scheme leverages blockchain networks to replace credential issuing authorities and employs zero-knowledge proofs to ensure the secure and reliable distribution of credentials. Additionally, the scheme enables users to selectively disclose attributes according to their needs, thereby effectively avoiding the excessive exposure of private information. We also explores the construction methods of zero-knowledge proofs that comply with Chinese commercial cryptography standards and proposes a set membership proof scheme based on SM2, providing a foundational tool for designing the SM2-based decentralized anonymous credential. Security analysis proves that the proposed SM2-based decentralized anonymous credential scheme satisfies both unforgeability and anonymity requirements. Performance experiments further show that the scheme maintains efficiency suitable for real-world deployment.

       

    /

    返回文章
    返回