scholarly journals A CPK-Based Identity Authentication Scheme for IoT

2022 ◽  
Vol 40 (3) ◽  
pp. 1217-1231
Author(s):  
Mingming Zhang ◽  
Jiaming Mao ◽  
Yuanyuan Ma ◽  
Liangjie Xu ◽  
Chuanjun Wang ◽  
...  
2021 ◽  
Vol 1812 (1) ◽  
pp. 012027
Author(s):  
Wanli Ma ◽  
Qi Zhang ◽  
Junwei Ma ◽  
Honglin Xue ◽  
Xiaowei Hao ◽  
...  

Author(s):  
Yuxiang Chen ◽  
Guishan Dong ◽  
Yao Hao ◽  
Zhaolei Zhang ◽  
Haiyang Peng ◽  
...  

2020 ◽  
Vol 69 (5) ◽  
pp. 5403-5415
Author(s):  
Liangjun Song ◽  
Gang Sun ◽  
Hongfang Yu ◽  
Xiaojiang Du ◽  
Mohsen Guizani

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Sheng Gao ◽  
Qianqian Su ◽  
Rui Zhang ◽  
Jianming Zhu ◽  
Zhiyuan Sui ◽  
...  

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.


Sign in / Sign up

Export Citation Format

Share Document