Skip to main content

2020 | OriginalPaper | Buchkapitel

An Open Identity Authentication Scheme Based on Blockchain

verfasst von : Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of Public Key Infrastructure (PKI), there implements lots of identity management systems in enterprises, hospitals, government departments, etc. These systems based on PKI are typically centralized systems. Each of them has their own certificate authority (CA) as trust anchor and is designed according their own understanding, thus formalizing lots of trust domains isolated from each other and there is no unified business standards with regard to trust delivery of an identity system to another, which caused a lot of inconveniences to users who have cross-domain requirements, for example, repeatedly register same physical identity in different domains, hard to prove the validity of an attestation issued by a domain to another. Present PKI systems choose solutions such as Trust list, Bridge CA or Cross-authentication of CAs to break trust isolation, but practice shows that they all have obvious defects under existing PKI structure. We propose an open identity authentication structure based on blockchain and design 3 protocols including: Physical identity registration protocol, virtual identity binding protocol and Attribution attestation protocol. The tests and security analysis show that the scheme has better practice value compared to traditional ones.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Adams, C., Lioyd, S.: Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edn. Addison Wesley Professional, Reading (2002) Adams, C., Lioyd, S.: Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edn. Addison Wesley Professional, Reading (2002)
6.
Zurück zum Zitat Myers, M., Ankney, R., Malpani, A., et al.: X.509 Internet Public Key Infrastructure: Online Certificate Status Protocols. EITFRFC 2560. PKIX Working Group (1999) Myers, M., Ankney, R., Malpani, A., et al.: X.509 Internet Public Key Infrastructure: Online Certificate Status Protocols. EITFRFC 2560. PKIX Working Group (1999)
8.
Zurück zum Zitat Ma, M., Meinel, C.: A proposal for trust model: independent trust intermediary service (ITIS). In: Proceedings of the ICWI 2002, pp. 785–790 (2002) Ma, M., Meinel, C.: A proposal for trust model: independent trust intermediary service (ITIS). In: Proceedings of the ICWI 2002, pp. 785–790 (2002)
9.
Zurück zum Zitat Thompson, M.R., Olson, D., Cowles, R., et al.: CA-Based trust model for grid authentication and identity delegation. In: Proceedings of the GGF7 (2003) Thompson, M.R., Olson, D., Cowles, R., et al.: CA-Based trust model for grid authentication and identity delegation. In: Proceedings of the GGF7 (2003)
11.
Zurück zum Zitat Peng, B., Liu, J., Gong, Z., et al.: Cross-domain Trust Model Based on Bridge CA. Ship Electronic Engineering (2017) Peng, B., Liu, J., Gong, Z., et al.: Cross-domain Trust Model Based on Bridge CA. Ship Electronic Engineering (2017)
12.
Zurück zum Zitat Leiba, B.: OAuth web authorization protocol. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef Leiba, B.: OAuth web authorization protocol. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef
16.
Zurück zum Zitat Kexin, H.: Research on FIDO UAF Authentication Protocols Security. University of Science and Technology of China (2016) Kexin, H.: Research on FIDO UAF Authentication Protocols Security. University of Science and Technology of China (2016)
19.
Zurück zum Zitat Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc, Sebastopol (2014) Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc, Sebastopol (2014)
25.
Zurück zum Zitat Canetti, R.: Universally composable signature, certification, and authentication. In: CSFW, p. 219. IEEE Computer society (2004) Canetti, R.: Universally composable signature, certification, and authentication. In: CSFW, p. 219. IEEE Computer society (2004)
26.
Zurück zum Zitat Maurer, U., Tackmann, B., Coretti, S.: Key exchange with unilateral authentication: composable security definition and modular protocol design. IACR Cryptology ePrint Archive 2013, 555 (2013) Maurer, U., Tackmann, B., Coretti, S.: Key exchange with unilateral authentication: composable security definition and modular protocol design. IACR Cryptology ePrint Archive 2013, 555 (2013)
27.
Zurück zum Zitat Kohlweiss, M., Maurer, U., Onete, C., Tackmann, B., Venturi, D.: (De-)Constructing TLS. IACR Cryptology ePrint Archive 2014, 20 (2014) Kohlweiss, M., Maurer, U., Onete, C., Tackmann, B., Venturi, D.: (De-)Constructing TLS. IACR Cryptology ePrint Archive 2014, 20 (2014)
28.
Zurück zum Zitat Weinberg, J.T.: Biometric identity. Soc. Sci. Electron. Publ. 59(1), 30–32 (2016) Weinberg, J.T.: Biometric identity. Soc. Sci. Electron. Publ. 59(1), 30–32 (2016)
29.
Zurück zum Zitat Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016) Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)
Metadaten
Titel
An Open Identity Authentication Scheme Based on Blockchain
verfasst von
Yuxiang Chen
Guishan Dong
Yao Hao
Zhaolei Zhang
Haiyang Peng
Shui Yu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38991-8_28

Premium Partner