A blockchain and signature based scheme for cross-domain authentication with decentralized identity

被引:0
作者
Zhang, Zinuo [1 ,2 ,4 ]
Ren, Wei [1 ,2 ,3 ,4 ]
Zhang, Xianchao [6 ,7 ]
Sun, Yani [5 ]
Zhu, Tianqing [8 ]
Choo, Kim-Kwang Raymond [9 ]
机构
[1] CASM, State Key Lab Geoinformat Engn, Beijing, Peoples R China
[2] CASM, Key Lab Surveying & Mapping Sci & Geospatial Infor, Beijing, Peoples R China
[3] Sichuan Univ, Key Lab Data Protect & Intelligent Management, Minist Educ, Chengdu, Peoples R China
[4] China Univ Geosci, Sch Comp Sci, Wuhan, Peoples R China
[5] Yunnan Innovat Inst Beihang Univ, Yunnan Key Lab Blockchain Applicat Technol, Kunming, Peoples R China
[6] Jiaxing Univ, Prov Key Lab Multimodal Perceiving & Intelligent S, Jiaxing, Peoples R China
[7] Jiaxing Univ, Engn Res Ctr Intelligent Human Hlth Situat Awarene, Jiaxing, Peoples R China
[8] City Univ Macau, Macao Special Adm Reg, Macau, Peoples R China
[9] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
关键词
Decentralized identity; Verifiable credential; Proxy signature; Threshold signature; Blockchain;
D O I
10.1016/j.csi.2025.103994
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, users access various network services without a unified identity authentication among domains, which not only obliges users to numerous network accounts, but also creates significant inconvenience for cross-domain authentication. Most existing schemes rely on the Public Key Infrastructure (PKI) system, which depends on the trustworthiness of Certificate Authorities (CAs). However, this poses challenges to maintaining user identity privacy. Addressing this issue, this paper proposes a blockchain-based cross-domain identity authentication scheme utilizing decentralized identity management, where users only need to register an account within one domain and can access services in other domains through verifiable credentials (VC). The scheme designs two types of VC, namely, directional VCs and general VCs. General VCs use threshold signatures allowing access to a larger number of domains. It also introduces proxy signatures to design a method for credential borrowing, further enhancing user convenience. Logical analysis using the Subject- Verb-Object (SVO) structure confirms the scheme's viability, while security analysis indicates its resilience against various attacks, including replay, impersonation, and internal threats. Moreover, the scheme provides substantial benefits for safeguarding user privacy and data security.
引用
收藏
页数:10
相关论文
共 30 条
[1]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]  
Avellaneda O, 2019, IEEE Communications Standards Magazine, V3, P10, DOI [10.1109/mcomstd.2019.9031542, 10.1109/MCOMSTD.2019.9031542, DOI 10.1109/MCOMSTD.2019.9031542]
[3]  
Axon L., 2016, 14 INT C SEC CRYPT S, V6
[4]   The Road to Decentralized Identity: The Techniques, Promises, and Challenges of Tomorrow's Digital Identity [J].
Campbell, Mark .
COMPUTER, 2023, 56 (06) :96-100
[5]   XAuth: Efficient Privacy-Preserving Cross-Domain Authentication [J].
Chen, Jing ;
Zhan, Zeyi ;
He, Kun ;
Du, Ruiying ;
Wang, Donghui ;
Liu, Fei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) :3301-3311
[6]   Trust Enhancement Scheme for Cross Domain Authentication of PKI system [J].
Chen, Yuxiang ;
Dong, Guishan ;
Bai, Jian ;
Hao, Yao ;
Li, Feng ;
Peng, Haiyang .
2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, :103-110
[7]  
Cheng Yage, 2019, Journal of Computer Applications, V39, P2629, DOI 10.11772/j.issn.1001-9081.2019030513
[8]  
Diffie W., 1976, IEEE Transactions on Information Theory, V22, P644, DOI [10.1145/3549993.355000, DOI 10.1145/3549993.355000, DOI 10.1145/3549993.3550007, 10.1145/3549993.3550007]
[9]  
Fei C., 2018, White Pap
[10]  
Fromknecht C., 2014, Mass. Inst. Technol. Camb. MA, USA, Tech. Rep, V6, P46