Attribute Signature Identity Authentication Scheme Based on Blockchain and Trusted Execution Environment

被引:0
|
作者
Ran J. [1 ]
Cai D. [1 ]
机构
[1] (School of Computer Science, Fudan University, Shanghai 200433)(Shanghai Engineering Research Center of Blockchain (Fudan University), Shanghai 200433)(Yiwu Research Institute, Fudan University, Yiwu, Zhejiang 322000)
基金
中国国家自然科学基金;
关键词
attribute signature; blockchain; decentralized identity; trusted execution environment(TEE); zero-knowledge proof;
D O I
10.7544/issn1000-1239.202330268
中图分类号
学科分类号
摘要
Identity authentication is a technology widely used in the current digital world. In the era of traffic supremacy, a secure and convenient identity authentication solution is crucial for attracting users to application services. Decentralized identity gives users complete control over their identity by using a fully decentralized technology such as blockchain. In order to further improve the security and convenience of identity authentication, an attribute signature authentication scheme based on blockchain and trusted execution environment is proposed. Existing identity verification methods have problems such as heavy management of user identity certificates and insufficient security. Attribute signatures are used by users to generate persistent credentials pointing to application services, and credentials are extensible. In the process of repeatedly expanding credentials, the user is more likely to be implanted with a Trojan horse than a single generation of credentials. The trusted execution environment can provide hardware-level protection during the signing process to avoid the leakage of intermediate parameters. At the same time, the audit of user identity leakage and fraudulent use is realized with a small additional verification cost, which further improves the security of the scheme. © 2023 Science Press. All rights reserved.
引用
收藏
页码:2555 / 2566
页数:11
相关论文
共 35 条
  • [1] Sixteen departments including the central network information office jointly announced the name of the national blockchain innovative application pilot
  • [2] Gayvoronskaya T, Meinel C., Blockchain: Hype or Innovation, (2020)
  • [3] Nakamoto S., Bitcoin: A peer-to-peer electronic cash system, (2008)
  • [4] Haber S, Stornetta W S., How to Time-stamp a Digital Document, (1991)
  • [5] Dwork C, Naor M., Pricing via processing or combatting junk mail[C], Proc of the 12th Annual Int Cryptology Conf on Advances in Cryptology, pp. 139-147, (1993)
  • [6] Back A., Hashcash−a denial of service counter-measure
  • [7] Vukolic M., Eventually returning to strong consistency[J], IEEE Data Engineering Bulletin, 39, 1, pp. 39-44, (2016)
  • [8] Statistical Bulletin of the People’s Republic of China on National Economic and Social Development in 2022
  • [9] Avellaneda O, Bachmann A, Barbir A, Et al., Decentralized identity: Where did it come from and where is it going?[J], IEEE Communications Standards Magazine, 3, 4, pp. 10-13, (2019)
  • [10] Liang Wei, Zhenjie Huang, Qunshan Chen, Decentralized attribute-based non-repudiation signature[J], Computer Engineering and Science, 42, 6, (2020)