An Authentication Scheme Using Identity-based Encryption & Blockchain

被引:0
|
作者
Zhou, Beini [1 ]
Li, Hui [1 ]
Xu, Li [1 ]
机构
[1] Peking Univ, Huawei & PKU Jointly Engn Lab Future Network Base, Shenzhen Engn Lab Converged Networking Technol,PK, Future Network PKU Lab Natl Major Res Infrastruct, Shenzhen 518055, Peoples R China
关键词
identity-based encryption; key escrow; blockchain; mutual identity authentication; safety;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Identity-based encryption is a key distribution system in which the public key of a user is derived directly from his identity information. Compared with PKI, Identity-based encryption simplifies key management issue, but it still suffers from drawbacks in key escrow and private key delivering. Motivated by this, we propose an improved key distribution solution called BIBE by integrating the technique of blockchain into the identity-based encryption. Specifically, we split the nodes in the chain to complete user authentication and private key protection, respectively. Furthermore, the two sides complete the mutual identity authentication with the identity information key pairs obtained from BIBE. Additionally, to prevent network attack, we employ timestamps, random numbers and hash algorithm in the process of identification. Through the rigorous and mathematical analysis, the proposed scheme demonstrates a far better performance on correctness, safety and efficiency.
引用
收藏
页码:561 / 566
页数:6
相关论文
共 50 条
  • [1] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography
    Ao, Weijun
    Fu, Shaojing
    Zhang, Chao
    Huang, Yuzhou
    Xia, Fei
    [J]. 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
  • [2] The fingerprint identity-based encryption scheme based on IBE and fingerprint authentication
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    [J]. Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (19-23+29):
  • [3] A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system
    Babu, Erukala Suresh
    Dadi, Ajay Kumar
    Singh, Krishna Kant
    Nayak, Soumya Ranjan
    Bhoi, Akash Kumar
    Singh, Akansha
    [J]. EXPERT SYSTEMS, 2022, 39 (10)
  • [4] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [5] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +
  • [6] Identity-based Public Key Keyword Searchable Encryption Scheme with Denial Authentication
    Cao Suzhen
    Ding Binbin
    Ding Xiaohui
    Dou Fengge
    Wang Caifen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (03) : 1086 - 1092
  • [7] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    [J]. J. China Univ. Post Telecom., 2008, 4 (75-80,120):
  • [9] AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES
    Bahramian, Mojtaba
    Hajirezaei, Elham
    [J]. FACTA UNIVERSITATIS-SERIES MATHEMATICS AND INFORMATICS, 2020, 35 (05): : 1451 - 1460
  • [10] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    [J]. Cryptology Inf. Secur. Ser., 2009, (45-64):