Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications

被引:73
作者
Yu, Yong [1 ,2 ]
Zhao, Yanqi [1 ]
Li, Yannan [3 ]
Du, Xiaojiang [4 ]
Wang, Lianhai [5 ]
Guizani, Mohsen [6 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Qilu Univ Technol, Shandong Prov Key Lab Comp Networks, Shandong Acad Sci,Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan,Shandong Prov Key Lab Co, Jinan 250353, Peoples R China
[6] Qatar Univ, Dept Comp Sci & Engn, Doha 2713, Qatar
基金
国家重点研发计划; 中国国家自然科学基金; 中国博士后科学基金;
关键词
Accumulator; anonymous credentials; blockchain; revocation; smart industry; EFFICIENT REVOCATION; SIGNATURE SCHEMES; SECURITY; ACCUMULATORS; PRIVACY; CREDENTIALS; SERVICES; PAIRINGS;
D O I
10.1109/TII.2019.2944678
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential protocols are not perfectly suitablefor smart industrial environments such as smart vehicles in the sense that the credential revocation issue is not well-solved. In this article, we propose a Blockchain-based Anonymous authentication with Selective revocation for Smart industrial applications (BASS) for smart industrial applications supporting attribute privacy, selective revocation, credential soundness, and multishowing-unlinkability. Specifically, an efficient selective revocation mechanism is proposed based on dynamic accumulators and the signature algorithm due to Pointcheval and Sanders as the overlay of the BASS. According to the diverse demands of credential authorities, BASS can selectively provide revocation of credentials or revocation of users. We extend BASS from single-attribute privacy to multiattribute privacy as well. Finally, we implement a prototype to evaluate the cryptographic core primitives of BASS by deploying smart contracts in Ethereum to demonstrate the validity of BASS in smart industrial applications.
引用
收藏
页码:3290 / 3300
页数:11
相关论文
共 36 条
[11]  
CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
[12]  
CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373
[13]  
Derler David, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P127, DOI 10.1007/978-3-319-16715-2_7
[14]   Location-aware services over vehicular ad-hoc networks using car-to-car communication [J].
Dikaiakos, Marios D. ;
Florides, Andreas ;
Nadeem, Tamer ;
Iftode, Liviu .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (08) :1590-1602
[15]   Security in wireless sensor networks [J].
Du, Xiaojiang ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) :60-66
[16]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[17]   Pairings for cryptographers [J].
Galbraith, Steven D. ;
Paterson, Kenneth G. ;
Smart, Nigel P. .
DISCRETE APPLIED MATHEMATICS, 2008, 156 (16) :3113-3121
[18]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208
[19]   A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2016, 63 (11) :7124-7132
[20]   ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks [J].
Huang, Jiun-Long ;
Yeh, Lo-Yao ;
Chien, Hung-Yu .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (01) :248-262