Skip to main content
Top

2020 | OriginalPaper | Chapter

An Open Identity Authentication Scheme Based on Blockchain

Authors : Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the development of Public Key Infrastructure (PKI), there implements lots of identity management systems in enterprises, hospitals, government departments, etc. These systems based on PKI are typically centralized systems. Each of them has their own certificate authority (CA) as trust anchor and is designed according their own understanding, thus formalizing lots of trust domains isolated from each other and there is no unified business standards with regard to trust delivery of an identity system to another, which caused a lot of inconveniences to users who have cross-domain requirements, for example, repeatedly register same physical identity in different domains, hard to prove the validity of an attestation issued by a domain to another. Present PKI systems choose solutions such as Trust list, Bridge CA or Cross-authentication of CAs to break trust isolation, but practice shows that they all have obvious defects under existing PKI structure. We propose an open identity authentication structure based on blockchain and design 3 protocols including: Physical identity registration protocol, virtual identity binding protocol and Attribution attestation protocol. The tests and security analysis show that the scheme has better practice value compared to traditional ones.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Adams, C., Lioyd, S.: Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edn. Addison Wesley Professional, Reading (2002) Adams, C., Lioyd, S.: Understanding PKI: Concepts, Standards and Deployment Considerations, 2nd edn. Addison Wesley Professional, Reading (2002)
6.
go back to reference Myers, M., Ankney, R., Malpani, A., et al.: X.509 Internet Public Key Infrastructure: Online Certificate Status Protocols. EITFRFC 2560. PKIX Working Group (1999) Myers, M., Ankney, R., Malpani, A., et al.: X.509 Internet Public Key Infrastructure: Online Certificate Status Protocols. EITFRFC 2560. PKIX Working Group (1999)
8.
go back to reference Ma, M., Meinel, C.: A proposal for trust model: independent trust intermediary service (ITIS). In: Proceedings of the ICWI 2002, pp. 785–790 (2002) Ma, M., Meinel, C.: A proposal for trust model: independent trust intermediary service (ITIS). In: Proceedings of the ICWI 2002, pp. 785–790 (2002)
9.
go back to reference Thompson, M.R., Olson, D., Cowles, R., et al.: CA-Based trust model for grid authentication and identity delegation. In: Proceedings of the GGF7 (2003) Thompson, M.R., Olson, D., Cowles, R., et al.: CA-Based trust model for grid authentication and identity delegation. In: Proceedings of the GGF7 (2003)
11.
go back to reference Peng, B., Liu, J., Gong, Z., et al.: Cross-domain Trust Model Based on Bridge CA. Ship Electronic Engineering (2017) Peng, B., Liu, J., Gong, Z., et al.: Cross-domain Trust Model Based on Bridge CA. Ship Electronic Engineering (2017)
12.
go back to reference Leiba, B.: OAuth web authorization protocol. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef Leiba, B.: OAuth web authorization protocol. IEEE Internet Comput. 16(1), 74–77 (2012)CrossRef
16.
go back to reference Kexin, H.: Research on FIDO UAF Authentication Protocols Security. University of Science and Technology of China (2016) Kexin, H.: Research on FIDO UAF Authentication Protocols Security. University of Science and Technology of China (2016)
19.
go back to reference Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc, Sebastopol (2014) Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc, Sebastopol (2014)
25.
go back to reference Canetti, R.: Universally composable signature, certification, and authentication. In: CSFW, p. 219. IEEE Computer society (2004) Canetti, R.: Universally composable signature, certification, and authentication. In: CSFW, p. 219. IEEE Computer society (2004)
26.
go back to reference Maurer, U., Tackmann, B., Coretti, S.: Key exchange with unilateral authentication: composable security definition and modular protocol design. IACR Cryptology ePrint Archive 2013, 555 (2013) Maurer, U., Tackmann, B., Coretti, S.: Key exchange with unilateral authentication: composable security definition and modular protocol design. IACR Cryptology ePrint Archive 2013, 555 (2013)
27.
go back to reference Kohlweiss, M., Maurer, U., Onete, C., Tackmann, B., Venturi, D.: (De-)Constructing TLS. IACR Cryptology ePrint Archive 2014, 20 (2014) Kohlweiss, M., Maurer, U., Onete, C., Tackmann, B., Venturi, D.: (De-)Constructing TLS. IACR Cryptology ePrint Archive 2014, 20 (2014)
28.
go back to reference Weinberg, J.T.: Biometric identity. Soc. Sci. Electron. Publ. 59(1), 30–32 (2016) Weinberg, J.T.: Biometric identity. Soc. Sci. Electron. Publ. 59(1), 30–32 (2016)
29.
go back to reference Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016) Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)
Metadata
Title
An Open Identity Authentication Scheme Based on Blockchain
Authors
Yuxiang Chen
Guishan Dong
Yao Hao
Zhaolei Zhang
Haiyang Peng
Shui Yu
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-38991-8_28

Premium Partner