An Open Identity Authentication Scheme Based on Blockchain

Author(s):  
Yuxiang Chen ◽  
Guishan Dong ◽  
Yao Hao ◽  
Zhaolei Zhang ◽  
Haiyang Peng ◽  
...  
2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

2020 ◽  
Vol 69 (5) ◽  
pp. 5403-5415
Author(s):  
Liangjun Song ◽  
Gang Sun ◽  
Hongfang Yu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sheng Gao ◽  
Qianqian Su ◽  
Rui Zhang ◽  
Jianming Zhu ◽  
Zhiyuan Sui ◽  
...  

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.


2020 ◽  
Vol 2020 ◽  
pp. 1-7
Author(s):  
Huijuan Wang ◽  
Yong Jiang

In a fog computing environment, lots of devices need to be authenticated in order to keep the platform being secured. To solve this problem, we turn to blockchain techniques. Unlike the identification cryptographic scheme based on elliptic curves, the proposed 2-adic ring identity authentication scheme inherits the high verification efficiency and high key distribution of sequence ciphers of 2-adic ring theory, and this algorithm adds identity hiding function and trading node supervision function by design. The main designed application scenario of this solution is applicable to the consortium blockchain, and the master nodes are mutually trusting cooperative relations. The node transaction verification and block generation consensus algorithm designed in this solution can be implemented in a set of algorithms, which has higher verification efficiency and easier to be deployed than other solutions. This scheme can be widely used in the fog computing environment.


Sign in / Sign up

Export Citation Format

Share Document