A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication

被引:0
作者
Zhao, Xinjian [1 ]
Xia, Fei [1 ]
Xia, Hanning [2 ]
Mao, Yunlong [2 ]
Chen, Shi [1 ]
机构
[1] Informat & Telecommun Branch State Grid Jiangsu El, Nanjing 210024, Peoples R China
[2] Nanjing Univ, Comp Sci & Technol Dept, Nanjing 210023, Peoples R China
关键词
cross-domain authentication; blockchain; zero-knowledge proof; zk-SNARK; security; privacy preserving;
D O I
10.3390/electronics13142730
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is a crucial security service on the Internet. In real-world applications, multiple independent trust domains often exist, with each recognizing only certain identities within their own systems. During cross-domain access, users cannot directly use their original certificates, which presents a cross-domain authentication problem. Traditional centralized schemes typically employ a trusted third party (TTP) to facilitate the transfer of identity trust across domains. These schemes inevitably inherit the vulnerabilities associated with single points of failure. In contrast, blockchain-based decentralized schemes effectively eliminate the potential threats posed by TTPs. However, the openness and transparency of the blockchain also bring new security issues, such as privacy leakage. In this paper, we propose a zk-SNARK-based anonymous scheme on the blockchain for cross-domain authentication. Specifically, our scheme adopts an authorization-then-proof structure, which strikes a delicate balance between anonymity and revocability. We provide theoretical proofs for the security of our scheme and explain how it achieves proactive revocability. Experimental evaluation results demonstrated that our scheme is both secure and efficient, and the revocation could be accomplished by introducing only 64 bytes of on-chain storage with one hash comparison.
引用
收藏
页数:17
相关论文
共 26 条
[1]  
Buterin V., 2015, White Paper, V3, P2
[2]   XAuth: Efficient Privacy-Preserving Cross-Domain Authentication [J].
Chen, Jing ;
Zhan, Zeyi ;
He, Kun ;
Du, Ruiying ;
Wang, Donghui ;
Liu, Fei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3301-3311
[3]  
Chen J, 2017, IEEE INFOCOM SER
[4]   A secure cross-domain authentication scheme based on threshold signature for MEC [J].
Chen, Lei ;
Guo, Chong ;
Gong, Bei ;
Waqas, Muhammad ;
Deng, Lihua ;
Qin, Haowen .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01)
[5]   ZoKrates - Scalable Privacy-Preserving Off-Chain Computations [J].
Eberhardt, Jacob ;
Tai, Stefan .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1084-1091
[6]  
Fan L., 2023, P ALGORITHMS ARCHITE, P93
[7]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[8]   On the Size of Pairing-Based Non-interactive Arguments [J].
Groth, Jens .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 :305-326
[9]   A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication [J].
Jiang, Junfeng ;
Zhang, Yujian ;
Li, Junhao .
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, :992-999
[10]  
Jing Chen, 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, P2060, DOI 10.1109/INFOCOM.2018.8486344