A Secure Certificateless Identity Authentication Scheme Based on Blockchain

被引:3
作者
Ao, Weijun [1 ]
Fu, Shaojing [1 ,2 ]
Zhang, Chao [1 ]
Xu, Ming [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Peoples R China
[2] Sate Key Lab Cryptol, Beijing, Peoples R China
来源
TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019 | 2020年 / 1149卷
关键词
Blockchain; Certificateless public key; Identity Authentication;
D O I
10.1007/978-981-15-3418-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Centralized systems based on the trusted third-party are widely used in identity authentication. However, there is a single point of failure inherent in the centralized systems. As a natural decentralized architecture, blockchain can bring the advantages of decentralization, trustworthiness and immutability to the identity authentication systems. The existing blockchain-based identity authentication systems can solve the problem of single point of failure, but there are still problems such as certificate management. In this paper, we propose an identity authentication scheme based on blockchain and certificateless public key cryptography. The scheme implements a decentralized database by deploying smart contracts in the Ethereum blockchain, and uses the certificateless public key signature algorithm during the authentication process. Compared with other blockchain-based identity authentication systems, our scheme not only prevents the single point of failure, but also avoids the deficiency of certificate management, and resists impersonation attacks and man-in-the-middle attacks. The security analysis and performance analysis show the security and stability of our scheme.
引用
收藏
页码:251 / 266
页数:16
相关论文
共 18 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] [Anonymous], 2017, IEEE INT C COMM ICC
  • [3] Axon L., 2015, Privacy-awareness in blockchain-based PKI
  • [4] Bellare M, 2006, LECT NOTES COMPUT SC, V4117, P602
  • [5] Blockchains and Smart Contracts for the Internet of Things
    Christidis, Konstantinos
    Devetsikiotis, Michael
    [J]. IEEE ACCESS, 2016, 4 : 2292 - 2303
  • [6] A First Look at Identity Management Schemes on the Blockchain
    Dunphy, Paul
    Petitcolas, Fabien A. P.
    [J]. IEEE SECURITY & PRIVACY, 2018, 16 (04) : 20 - 29
  • [7] Fromknecht C., 2014, CERTCOIN NAMECOIN BA
  • [8] Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
    Hammi, Mohamed Tahar
    Hammi, Badis
    Bellot, Patrick
    Serhrouchni, Ahmed
    [J]. COMPUTERS & SECURITY, 2018, 78 : 126 - 142
  • [9] Hota M., 2010, SIDDHANT J DECIS MAK, V10, P6
  • [10] Kolvart M., 2016, The Future of Law and eTechnologies, P133, DOI DOI 10.1007/978-3-319-26896-57