A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

被引:0
|
作者
Ao, Weijun [1 ]
Fu, Shaojing [1 ]
Zhang, Chao [1 ]
Huang, Yuzhou [1 ]
Xia, Fei [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Taiyuan Satellite Launch Ctr, Taiyuan, Peoples R China
关键词
blockchain; identity authentication; identity-based cryptography; challenge-response protocol;
D O I
10.1109/ccet48361.2019.8989361
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage process. In this paper, we propose an identity authentication scheme based on blockchain and identity-based cryptography (IBC). The scheme implements a decentralized private key generator (PKG) by deploying the smart contract in Ethereum blockchain, and uses the IBC signature algorithm and challenge-response protocol during the authentication process. Compared with other blockchain-based identity authentication systems, the scheme not only prevents the single point of failure, but also avoids the complex certificate management, has lower system complexity, and resists impersonation attack, man-in-the- middle attack and replay attack.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [1] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [2] A Secure Certificateless Identity Authentication Scheme Based on Blockchain
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Xu, Ming
    [J]. TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 251 - 266
  • [3] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [4] Research on Application of Blockchain and Identity-Based Cryptography
    Zhu, Xingxiong
    Fan, Tao
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [5] A Cross-Domain Authentication Protocol by Identity-Based Cryptography on Consortium Blockchain
    Wei, Song-Jie
    Li, Sha-Sha
    Wang, Jia-He
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 908 - 920
  • [6] A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography
    Luo, Min
    Zhang, Yunru
    Khan, Muhammad Khurram
    He, Debiao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [7] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [8] An Identity-based Cryptography Scheme Based on FullIdent Algorithm
    Xie Yumin
    Kamran, Muhammad
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2691 - 2696
  • [9] Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
    Sood, Sandeep K.
    [J]. INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 67 - 77
  • [10] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298