Non-transferable blockchain-based identity authentication

被引:6
作者
Fu, Yuxia [1 ,2 ]
Shao, Jun [3 ]
Huang, Qingjia [1 ,2 ]
Zhou, Qihang [1 ,2 ]
Feng, Huamin [4 ]
Jia, Xiaoqi [1 ,2 ]
Wang, Ruiyi [1 ,2 ]
Feng, Wenzhi [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100080, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Zhejiang Gongshang Univ, Hangzhou 310018, Zhejiang, Peoples R China
[4] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity authentication; Privacy preservation; Single Sign-On; Ring signature; Diffie-Hellman key exchange; PROTOCOL;
D O I
10.1007/s12083-023-01481-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the identification functionality, identity authentication is the first and primary security step in many information systems. There exist many works dedicated to giving secure identity authentication. However, most of the existing schemes suffer from at least one of the following problems: heavy account management, single point of failure, and privacy leakage. To tackle these challenges, we propose two blockchain-based identity authentication schemes in this paper. One is based on the famous Diffie-Hellman key exchange protocol and is efficient but with user-verifier interaction. The other utilizes the ring signature, which is non-interactive with a small computational cost. Besides the traditional security properties, such as unforgeability and identity anonymity, our proposed schemes can hold non-transferability, i.e., the verifier cannot prove the user's identity authentication to any third party. At last, the extensive experimental results demonstrate that our proposals are practical and efficient.
引用
收藏
页码:1354 / 1364
页数:11
相关论文
共 41 条
[1]  
Abe M, 2002, LECT NOTES COMPUT SC, V2501, P415
[2]   A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm [J].
Abusukhon, Ahmad ;
Anwar, Muhammad Naveed ;
Mohammad, Zeyad ;
Alghannam, Bareeq .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (01) :65-81
[3]  
[Anonymous], 2022, GVR REP COV VER MARK
[4]  
Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
[5]  
Backes M, 2019, ANN INT C THEOR APPL
[6]   A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment [J].
Ben Amor, Arij ;
Abid, Mohamed ;
Meddeb, Aref .
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, :1225-1231
[7]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[8]   A Secure Single Sign-On Mechanism for Distributed Computer Networks [J].
Chang, Chin-Chen ;
Lee, Chia-Yin .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2012, 59 (01) :629-637
[9]   Secure Identity Authentication of Community Medical Internet of Things [J].
Cheng, Xu ;
Zhang, Ziyang ;
Chen, Fulong ;
Zhao, Chuanxin ;
Wang, Taochun ;
Sun, Hui ;
Huang, Cheng .
IEEE ACCESS, 2019, 7 :115966-115977
[10]  
Ebrahimi A, 2017, US Patent, Patent No. [9,722,790, 9722790]