A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

被引:0
|
作者
Ao, Weijun [1 ]
Fu, Shaojing [1 ]
Zhang, Chao [1 ]
Huang, Yuzhou [1 ]
Xia, Fei [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Taiyuan Satellite Launch Ctr, Taiyuan, Peoples R China
关键词
blockchain; identity authentication; identity-based cryptography; challenge-response protocol;
D O I
10.1109/ccet48361.2019.8989361
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage process. In this paper, we propose an identity authentication scheme based on blockchain and identity-based cryptography (IBC). The scheme implements a decentralized private key generator (PKG) by deploying the smart contract in Ethereum blockchain, and uses the IBC signature algorithm and challenge-response protocol during the authentication process. Compared with other blockchain-based identity authentication systems, the scheme not only prevents the single point of failure, but also avoids the complex certificate management, has lower system complexity, and resists impersonation attack, man-in-the- middle attack and replay attack.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [31] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [32] Provably secure identity-based threshold unsigncryption scheme
    Yang, Bo
    Yu, Yong
    Li, Fagen
    Sun, Ying
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 114 - +
  • [33] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
  • [34] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [35] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    [J]. Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [36] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [37] Multipurpose identity-based signcryption - A swiss army knife for identity-based cryptography
    Boyen, X
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 383 - 399
  • [38] Multi-identity management for identity-based cryptography
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (06): : 639 - 672
  • [40] A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system
    Babu, Erukala Suresh
    Dadi, Ajay Kumar
    Singh, Krishna Kant
    Nayak, Soumya Ranjan
    Bhoi, Akash Kumar
    Singh, Akansha
    [J]. EXPERT SYSTEMS, 2022, 39 (10)