西安电子科技大学学报 ›› 2023, Vol. 50 ›› Issue (4): 100-110.doi: 10.19665/j.issn1001-2400.2023.04.010

• 网络空间安全专栏 • 上一篇    下一篇

一种标识符动态协商的匿名通信模型

杨晓晖(),庄海晶()   

  1. 河北大学 网络空间安全与计算机学院,河北 保定 071000
  • 收稿日期:2022-12-31 出版日期:2023-08-20 发布日期:2023-10-17
  • 通讯作者: 庄海晶
  • 作者简介:杨晓晖(1975—),男,教授,E-mail:yxh@hbu.edu.cn
  • 基金资助:
    国家重点研发计划(2017YFB0802300);河北省自然科学基金(F2021201052)

Anonymous communication model with dynamic negotiation of identifiers

YANG Xiaohui(),ZHUANG Haijing()   

  1. School of Cyber Security and Computer,Hebei University,Baoding 071000,China
  • Received:2022-12-31 Online:2023-08-20 Published:2023-10-17
  • Contact: Haijing ZHUANG

摘要:

过去的十几年是通信技术、计算范式快速发展的大数据时代。在大数据应用大量增加的背景下,数字信息传递已成为人类交流的一种重要形式。但是,数字信息传递过程中存在很多的安全隐患,如信息传递中存在数据泄漏频繁发生的安全问题。匿名通信作为通信过程中隐私保护的关键手段之一,受到广泛关注。然而,现有的匿名通信模型不能在保证通信效率的同时,有效地应对诸如重放攻击、中间人攻击、统计攻击等攻击手段,因而提出一种标识符动态协商的匿名通信模型。在预处理阶段,采用椭圆曲线迪菲-赫尔曼密钥交换改进的标识符协商方法,该方法让网络中每两个成员协商出通信标识符和加密消息的对称密钥,提高预处理阶段的协商效率;在匿名通信阶段,标识符可以随每次通信的进行而动态变化,有效抵抗重放攻击和统计攻击。方案同时设置专门的追查机构,将去除匿名的权利给追查机构,防止恶意用户拒绝去除匿名。安全性分析证明了该方案的鲁棒性,性能实验证明了该方案在保证安全性的同时,有更高的通信效率。

关键词: 匿名通信, 隐私保护技术, 身份追踪, 身份识别

Abstract:

The past decade has been a big data era of rapid development in communication technology and computing paradigms.With the increasing application of big data,digital information transmission has become an important form of human communication.However,there are many hidden security risks in the process of digital information transmission.Data leakage often occurs in the process of information transmission.As one of the key means of privacy protection in the communication process,anonymous communication has been widely concerned.However,the existing anonymous communication models cannot effectively cope with attacks such as replay attack,man-in-the-middle attack,and statistical attack while ensuring the communication efficiency.This paper proposes an anonymous communication model based on identifier dynamic negotiation.In the preprocessing stage,an improved identifier negotiation method based on ECDH key exchange is adopted,which allows every two members in the network to negotiate the communication identifier and the symmetric key for encrypting messages,and improves the negotiation efficiency in the preprocessing stage.In the anonymous communication stage,identifiers can be dynamically changed with each communication,which effectively resists replay attacks and statistical attacks.The scheme also sets up a special investigation agency for giving the right to remove anonymity to the investigation agency,preventing malicious users from refusing to remove anonymity.Security analysis proves the robustness of the scheme.Performance experiments show that the scheme has a higher communication efficiency while ensuring security.

Key words: anonymous communication, privacy-preserving techniques, identity Tracking, identification

中图分类号: 

  • TP3
Baidu
map