An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks

被引:93
作者
Xu, Jie [1 ]
Xue, Kaiping [1 ]
Tian, Hangyu [1 ]
Hong, Jianan [2 ]
Wei, David S. L. [3 ]
Hong, Peilin [1 ]
机构
[1] Univ Sci & Technol China, Dept Elect Engn & Informat Sci, Hefei 230027, Peoples R China
[2] Huawei Shanghai Res Inst, Shanghai 201206, Peoples R China
[3] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
基金
中国国家自然科学基金;
关键词
Authentication; Servers; Wireless communication; Public key; Communication system security; Identity management; mutual authentication; chameleon hash; redactable blockchain; KEY AGREEMENT; PROTOCOL; EFFICIENT; SECURE;
D O I
10.1109/TVT.2020.2986041
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
More and more users are eager to obtain more comprehensive network services without revealing their private information. Traditionally, in order to access a network, a user is authorized with an identity and corresponding keys, which are generated and managed by the network operator. All users' personally identifying information are centralized stored by the network operator. However, this approach makes users lose the control of their personally identifying information. Users are concerned about who can access these sensitive data and whether they have been compromised. In this paper, we propose a blockchain-based identity management and authentication scheme for mobile networks, where users' identifying information are controlled by the users themselves. Our scheme let users generate their self-sovereign identities (SSIs) and corresponding public keys and private keys. The private key used to authenticate the user's identifying information is only known to the user. We use blockchain to record SSIs and public keys of legitimate user, and adopt chameleon hash to delete illegal users' information on the blockchain, while keeping the block head unchanged. Furthermore, other service providers can obtain the user's SSI and public key and authenticate users by querying the blockchain. Experimental results confirm that our scheme can greatly reduce the revocation overhead and communication overhead.
引用
收藏
页码:6688 / 6698
页数:11
相关论文
共 35 条
[1]  
Alboaie S., 2017, P IFIP INT C DISTR A, P83
[2]  
[Anonymous], 2019, IEEE ACCESS, DOI DOI 10.1109/ACCESS.2019.2931173
[3]   Redactable Blockchain - or - Rewriting History in Bitcoin and Friends [J].
Ateniese, Giuseppe ;
Magri, Bernardo ;
Venturi, Daniele ;
Andrade, Ewerton R. .
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, :111-126
[4]   User-centric identity management - New trends in standardization and regulation [J].
Bramhall, Pete ;
Hansen, Marit ;
Rannenberg, Kai ;
Roessler, Thomas .
IEEE SECURITY & PRIVACY, 2007, 5 (04) :84-87
[5]   Federated Identity Architecture of the European eID System [J].
Carretero, Jesus ;
Izquierdo-Moreno, Guillermo ;
Vasile-Cabezas, Mario ;
Garcia-Blas, Javier .
IEEE ACCESS, 2018, 6 :75302-75326
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]   An Anonymous and Self-Verified Mobile Authentication with Authenticated Key Agreement for Large-Scale Wireless Networks [J].
Chang, Chin-Chen ;
Tsai, Hao-Chuan .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) :3346-3353
[8]   Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-B ased [J].
Derler, David ;
Samelin, Kai ;
Slamanig, Daniel ;
Striecks, Christoph .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[9]   The seven flaws of identity management - Usability and security challenges [J].
Dhamija, Rachna ;
Dusseault, Lisa .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :24-29
[10]   Differential Privacy-Based Blockchain for Industrial Internet-of-Things [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Zhang, Zijian ;
Qiu, Meikang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) :4156-4165