scholarly journals A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sheng Gao ◽  
Qianqian Su ◽  
Rui Zhang ◽  
Jianming Zhu ◽  
Zhiyuan Sui ◽  
...  

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Gwan-Hwan Hwang ◽  
Tao-Ku Chang ◽  
Hung-Wen Chiang

The PKI framework is a widely used network identity verification framework. Users will register their identity information with a certification authority to obtain a digital certificate and then show the digital certificate to others as an identity certificate. After others receive the certificate, they must check the revocation list from the CA to confirm whether the certificate is valid. Although this architecture has a long history of use on the Internet, significant doubt surrounds its security. Because the CA may be attacked by DDoS, the verifier may not obtain the revocation list to complete the verification process. At present, there are many new PKI architectures that can improve on the CA’s single point of failure, but since they still have some shortcomings, the original architecture is still used. In this paper, we proposed a semidecentralized PKI architecture that can easily prevent a single point of failure. Users can obtain cryptographic evidence through specific protocols to clarify the responsibility for the incorrect certificate and then submit the cryptographic evidence to the smart contract for automatic judgment and indemnification.


2019 ◽  
Vol 30 (04) ◽  
pp. 531-549 ◽  
Author(s):  
Zhongyuan Yao ◽  
Yi Mu

We present an access control encryption (ACE) scheme which enjoys advantages over previous works in several aspects. Our scheme ensures not only compact ciphertext size but also small size of keys installed in each user in the ACE system. Besides, to the best of our knowledge, our scheme is the first implementation of ACE with decentralized sanitizers. Comparing to ACE constructions with only one sanitizer, our scheme is more secure and reliable since it does not suffer from the single point failure. Considering the security of our scheme, we present two models catering to the no-read rule and no-write rule security requirements respectively. Additionally, our extended no-write rule model allows the corruption of some sanitizers in the ACE system and thus is stronger than the one for schemes with only one sanitizer. We prove the security of our scheme under the two models.


2018 ◽  
Vol 13 (2) ◽  
pp. 187-211
Author(s):  
Patricia E. Chu

The Paris avant-garde milieu from which both Cirque Calder/Calder's Circus and Painlevé’s early films emerged was a cultural intersection of art and the twentieth-century life sciences. In turning to the style of current scientific journals, the Paris surrealists can be understood as engaging the (life) sciences not simply as a provider of normative categories of materiality to be dismissed, but as a companion in apprehending the “reality” of a world beneath the surface just as real as the one visible to the naked eye. I will focus in this essay on two modernist practices in new media in the context of the history of the life sciences: Jean Painlevé’s (1902–1989) science films and Alexander Calder's (1898–1976) work in three-dimensional moving art and performance—the Circus. In analyzing Painlevé’s work, I discuss it as exemplary of a moment when life sciences and avant-garde technical methods and philosophies created each other rather than being classified as separate categories of epistemological work. In moving from Painlevé’s films to Alexander Calder's Circus, Painlevé’s cinematography remains at the forefront; I use his film of one of Calder's performances of the Circus, a collaboration the men had taken two decades to complete. Painlevé’s depiction allows us to see the elements of Calder's work that mark it as akin to Painlevé’s own interest in a modern experimental organicism as central to the so-called machine-age. Calder's work can be understood as similarly developing an avant-garde practice along the line between the bestiary of the natural historian and the bestiary of the modern life scientist.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3929
Author(s):  
Han-Yun Chen ◽  
Ching-Hung Lee

This study discusses convolutional neural networks (CNNs) for vibration signals analysis, including applications in machining surface roughness estimation, bearing faults diagnosis, and tool wear detection. The one-dimensional CNNs (1DCNN) and two-dimensional CNNs (2DCNN) are applied for regression and classification applications using different types of inputs, e.g., raw signals, and time-frequency spectra images by short time Fourier transform. In the application of regression and the estimation of machining surface roughness, the 1DCNN is utilized and the corresponding CNN structure (hyper parameters) optimization is proposed by using uniform experimental design (UED), neural network, multiple regression, and particle swarm optimization. It demonstrates the effectiveness of the proposed approach to obtain a structure with better performance. In applications of classification, bearing faults and tool wear classification are carried out by vibration signals analysis and CNN. Finally, the experimental results are shown to demonstrate the effectiveness and performance of our approach.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1117
Author(s):  
Bin Li ◽  
Zhikang Jiang ◽  
Jie Chen

Computing the sparse fast Fourier transform (sFFT) has emerged as a critical topic for a long time because of its high efficiency and wide practicability. More than twenty different sFFT algorithms compute discrete Fourier transform (DFT) by their unique methods so far. In order to use them properly, the urgent topic of great concern is how to analyze and evaluate the performance of these algorithms in theory and practice. This paper mainly discusses the technology and performance of sFFT algorithms using the aliasing filter. In the first part, the paper introduces the three frameworks: the one-shot framework based on the compressed sensing (CS) solver, the peeling framework based on the bipartite graph and the iterative framework based on the binary tree search. Then, we obtain the conclusion of the performance of six corresponding algorithms: the sFFT-DT1.0, sFFT-DT2.0, sFFT-DT3.0, FFAST, R-FFAST, and DSFFT algorithms in theory. In the second part, we make two categories of experiments for computing the signals of different SNRs, different lengths, and different sparsities by a standard testing platform and record the run time, the percentage of the signal sampled, and the L0, L1, and L2 errors both in the exactly sparse case and the general sparse case. The results of these performance analyses are our guide to optimize these algorithms and use them selectively.


2021 ◽  
Vol 17 (2) ◽  
pp. 186-203
Author(s):  
Nathan Genicot

AbstractThe COVID-19 pandemic has given rise to the massive development and use of health indicators. Drawing on the history of international public health and of the management of infectious disease, this paper attempts to show that the normative power acquired by metrics during the pandemic can be understood in light of two rationales: epidemiological surveillance and performance assessment. On the one hand, indicators are established to evaluate and rank countries’ responses to the outbreak; on the other, the evolution of indicators has a direct influence on the content of public health policies. Although quantitative data are an absolute necessity for coping with such disasters, it is critical to bear in mind the inherent partiality and precarity of the information provided by health indicators. Given the growing importance of normative quantitative devices during the pandemic, and assuming that their influence is unlikely to decrease in the future, they call for close scrutiny.


2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Sang-Soo Yeo ◽  
Dae-il Park ◽  
Young-Ae Jung

This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.


2013 ◽  
Vol 706-708 ◽  
pp. 1116-1119
Author(s):  
Hong He ◽  
Li Li ◽  
Zhi Hong Zhang

This paper has proposed a kind of intelligent entrance guard system, which is based on 32 bit ARM7TDMI embedded system combined with RFID technology. By expanding sound alarm, display and communication module inside, RF, camera module and fingerprint module outside, it can realize multiple identity authentication, so the security and protection ability of the entrance guard system get enhanced.


Sign in / Sign up

Export Citation Format

Share Document