A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

被引:0
|
作者
Ao, Weijun [1 ]
Fu, Shaojing [1 ]
Zhang, Chao [1 ]
Huang, Yuzhou [1 ]
Xia, Fei [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Taiyuan Satellite Launch Ctr, Taiyuan, Peoples R China
关键词
blockchain; identity authentication; identity-based cryptography; challenge-response protocol;
D O I
10.1109/ccet48361.2019.8989361
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage process. In this paper, we propose an identity authentication scheme based on blockchain and identity-based cryptography (IBC). The scheme implements a decentralized private key generator (PKG) by deploying the smart contract in Ethereum blockchain, and uses the IBC signature algorithm and challenge-response protocol during the authentication process. Compared with other blockchain-based identity authentication systems, the scheme not only prevents the single point of failure, but also avoids the complex certificate management, has lower system complexity, and resists impersonation attack, man-in-the- middle attack and replay attack.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [21] E-passport EAC scheme based on Identity-Based Cryptography
    Li, C. H.
    Zhang, X. F.
    Jin, H.
    Xiang, W.
    [J]. INFORMATION PROCESSING LETTERS, 2010, 111 (01) : 26 - 30
  • [22] A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems
    Yaduvanshi, Ritika
    Mishra, Shivendu
    Yadav, Nimisha
    Rajpoot, Prince
    [J]. ANNALS OF TELECOMMUNICATIONS, 2024, 79 (5-6) : 415 - 436
  • [23] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [24] An Efficient and Secure Identity-based Conditional Privacy-Preserving Authentication Scheme in VANETs
    Wang, Xianglong
    Chen, Qiuting
    Peng, Zhenwan
    Wang, Yimin
    [J]. International Journal of Network Security, 2022, 24 (04) : 661 - 670
  • [25] A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Li, Yuting
    Cheng, Qingfeng
    Liu, Ximeng
    Li, Xinghua
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 935 - 946
  • [26] An Identity Authentication Scheme of Energy Internet Based on Blockchain
    Tian, Xiuxia
    Chen, Xi
    Li, Siqian
    [J]. International Journal of Network Security, 2021, 23 (02) : 261 - 269
  • [27] Forward Secure Identity-Based Signature Scheme with RSA
    Ko, Hankyung
    Jeong, Gweonho
    Kim, Jongho
    Kim, Jihye
    Oh, Hyunok
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 314 - 327
  • [28] A secure and efficient identity-based quantum signature scheme
    Liu, Bai
    Zhu, Pengda
    Guo, Kuikui
    [J]. AIP ADVANCES, 2024, 14 (06)
  • [29] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [30] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222