Skip to main content

2019 | OriginalPaper | Buchkapitel

An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain

verfasst von : Qianqian Su, Rui Zhang, Rui Xue, You Sun

Erschienen in: Web Services – ICWS 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Blockchain has become a hot topic in recent years. Many applications apply permissioned blockchain to achieve secure data sharing across organizations such as healthcare blockchain. In the permissioned blockchain, on the one hand, the blockchain system is required to support efficient and dynamic authentication for adding and deleting users in a distributed environment. On the other hand, in some particular applications such as healthcare domain, users prefer to keep anonymity in the process of authentication. Although many solutions for anonymous authentication have been proposed, they often require the participation of a central trusted party in the process of authentication and are not efficient enough. In this paper, we focus on designing an efficient traceable and anonymous authentication scheme, which supports efficient authentication while without revealing user’s identity information and does not requires the participation of a central trusted party. While, in case of dispute, the identity of users can be revealed. Moreover, the proposed scheme is able to support dynamic adding and deleting users. Finally, we analyze the security and privacy properties of the proposed scheme and evaluate its performance in terms of computational cost. The experimental results show that the proposed scheme is more efficient than exist schemes and can be easily deployed in the permissioned blockchain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149–177 (2008)MathSciNetCrossRef Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149–177 (2008)MathSciNetCrossRef
5.
Zurück zum Zitat Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10, 1–10 (2015) Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10, 1–10 (2015)
6.
Zurück zum Zitat He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Inf. Sci. 321, 1–6 (2013) He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Inf. Sci. 321, 1–6 (2013)
8.
Zurück zum Zitat Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., Shen, X.: CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. Internet Things J. IEEE 1, 46–57 (2014)CrossRef Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., Shen, X.: CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. Internet Things J. IEEE 1, 46–57 (2014)CrossRef
9.
Zurück zum Zitat Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Veh. Technol. IEEE Transact. 61, 86–96 (2012)CrossRef Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Veh. Technol. IEEE Transact. 61, 86–96 (2012)CrossRef
10.
Zurück zum Zitat Ni, J., Zhang, K., Lin, X., Yang, H., Shen, X.: AMA: Anonymous mutual authentication with traceability in carpooling systems. pp. 1–6, May 2016 Ni, J., Zhang, K., Lin, X., Yang, H., Shen, X.: AMA: Anonymous mutual authentication with traceability in carpooling systems. pp. 1–6, May 2016
11.
Zurück zum Zitat Satoshi, N.: A peer-to-peer electronic cash system (2008) Satoshi, N.: A peer-to-peer electronic cash system (2008)
12.
Zurück zum Zitat Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Transact. Inf. Forensics Secur. 13, 1–1 (2017) Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Transact. Inf. Forensics Secur. 13, 1–1 (2017)
13.
Zurück zum Zitat Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Sebastopol (2015) Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Sebastopol (2015)
14.
Zurück zum Zitat Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)CrossRef Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)CrossRef
15.
Zurück zum Zitat Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Transact. Dependable Secure Comput. 15, 1–22 (2016) Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Transact. Dependable Secure Comput. 15, 1–22 (2016)
16.
Zurück zum Zitat Wu, F., et al.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks: a novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Sec. Commun. Netw. 9, 3527–3542 (2016)CrossRef Wu, F., et al.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks: a novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Sec. Commun. Netw. 9, 3527–3542 (2016)CrossRef
17.
Zurück zum Zitat Yang, G., Huang, Q., Wong, D., Deng, X.: Universal authentication protocols for anonymous wireless communications. Trans. Wireless. Comm. 9, 168–174 (2010)CrossRef Yang, G., Huang, Q., Wong, D., Deng, X.: Universal authentication protocols for anonymous wireless communications. Trans. Wireless. Comm. 9, 168–174 (2010)CrossRef
18.
Zurück zum Zitat Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transact. Consum. Electron. 50, 231–235 (2004)CrossRef Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transact. Consum. Electron. 50, 231–235 (2004)CrossRef
Metadaten
Titel
An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain
verfasst von
Qianqian Su
Rui Zhang
Rui Xue
You Sun
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23499-7_8

Premium Partner