Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2023

08-05-2023

Non-transferable blockchain-based identity authentication

Authors: Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng

Published in: Peer-to-Peer Networking and Applications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the identification functionality, identity authentication is the first and primary security step in many information systems. There exist many works dedicated to giving secure identity authentication. However, most of the existing schemes suffer from at least one of the following problems: heavy account management, single point of failure, and privacy leakage. To tackle these challenges, we propose two blockchain-based identity authentication schemes in this paper. One is based on the famous Diffie-Hellman key exchange protocol and is efficient but with user-verifier interaction. The other utilizes the ring signature, which is non-interactive with a small computational cost. Besides the traditional security properties, such as unforgeability and identity anonymity, our proposed schemes can hold non-transferability, i.e., the verifier cannot prove the user’s identity authentication to any third party. At last, the extensive experimental results demonstrate that our proposals are practical and efficient.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We will give more details in Update phase.
 
2
Given \((g,g^a,g^b)\), it is intractable to compute \(g^{ab}\).
 
Literature
2.
go back to reference Satybaldy A, Nowostawski M, Ellingsen J (2020) Self-sovereign identity systems. In: IFIP International Summer School on Privacy and Identity Management. Springer, pp 447–461 Satybaldy A, Nowostawski M, Ellingsen J (2020) Self-sovereign identity systems. In: IFIP International Summer School on Privacy and Identity Management. Springer, pp 447–461
3.
go back to reference Cheng X, Zhang Z, Chen F, Zhao C, Wang T, Sun H, Huang C (2019) Secure identity authentication of community medical internet of things. IEEE Access 7:115966–115977CrossRef Cheng X, Zhang Z, Chen F, Zhao C, Wang T, Sun H, Huang C (2019) Secure identity authentication of community medical internet of things. IEEE Access 7:115966–115977CrossRef
4.
go back to reference Norta A, Matulevičius R, Leiding B (2019) Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. Comput Secur J 86:253–269CrossRef Norta A, Matulevičius R, Leiding B (2019) Safeguarding a formalized blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. Comput Secur J 86:253–269CrossRef
5.
go back to reference Cao Y, Yang L (2010) A survey of identity management technology. In: 2010 IEEE International Conference on Information Theory and Information Security. IEEE, pp 287–293 Cao Y, Yang L (2010) A survey of identity management technology. In: 2010 IEEE International Conference on Information Theory and Information Security. IEEE, pp 287–293
6.
go back to reference Amor AB, Abid M, Meddeb A (2017) A privacy-preserving authentication scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). IEEE, pp 1225–1231 Amor AB, Abid M, Meddeb A (2017) A privacy-preserving authentication scheme in an edge-fog environment. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). IEEE, pp 1225–1231
7.
go back to reference Kurniawan R (2022) Perancangan dan implementasi sistem otentikasi oauth 2.0 dan pkce berbasis extreme programming (XP). Jurnal Pendidikan dan Teknologi Indonesia 2(2):81–91 Kurniawan R (2022) Perancangan dan implementasi sistem otentikasi oauth 2.0 dan pkce berbasis extreme programming (XP). Jurnal Pendidikan dan Teknologi Indonesia 2(2):81–91
8.
go back to reference Chang C-C, Lee C-Y (2011) A secure single sign-on mechanism for distributed computer networks. IEEE Trans Industr Electron 59(1):629–637CrossRef Chang C-C, Lee C-Y (2011) A secure single sign-on mechanism for distributed computer networks. IEEE Trans Industr Electron 59(1):629–637CrossRef
9.
go back to reference Wang J, Wu L, Choo K-KR, He D (2019) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Industr Inf 16(3):1984–1992CrossRef Wang J, Wu L, Choo K-KR, He D (2019) Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans Industr Inf 16(3):1984–1992CrossRef
10.
go back to reference Shuaib M, Hassan NH, Usman S, Alam S, Bhatia S, Agarwal P, Idrees SM (2022) Land registry framework based on self-sovereign identity (ssi) for environmental sustainability. Sustainability 14(9):5400CrossRef Shuaib M, Hassan NH, Usman S, Alam S, Bhatia S, Agarwal P, Idrees SM (2022) Land registry framework based on self-sovereign identity (ssi) for environmental sustainability. Sustainability 14(9):5400CrossRef
11.
go back to reference Mahmood K, Li X, Chaudhry SA, Naqvi H, Kumari S, Sangaiah AK, Rodrigues JJ (2018) Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Futur Gener Comput Syst 88:491–500CrossRef Mahmood K, Li X, Chaudhry SA, Naqvi H, Kumari S, Sangaiah AK, Rodrigues JJ (2018) Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Futur Gener Comput Syst 88:491–500CrossRef
12.
go back to reference Jia X, He D, Kumar N, Choo K-KR (2019) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560–571CrossRef Jia X, He D, Kumar N, Choo K-KR (2019) A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst J 14(1):560–571CrossRef
13.
go back to reference Josang A, AlZomai M, Suriadi S (2007) Usability and privacy in identity management architectures. In: ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, pp 143–152 Josang A, AlZomai M, Suriadi S (2007) Usability and privacy in identity management architectures. In: ACSW Frontiers 2007: Proceedings of 5th Australasian Symposium on Grid Computing and e-Research, 5th Australasian Information Security Workshop (Privacy Enhancing Technologies), and Australasian Workshop on Health Knowledge Management and Discovery. Australian Computer Society, pp 143–152
14.
go back to reference Zhu H, Hu J, Chang S, Lu L (2017) Shakein: secure user authentication of smartphones with single-handed shakes. IEEE Trans Mob Comput 16(10):2901–2912CrossRef Zhu H, Hu J, Chang S, Lu L (2017) Shakein: secure user authentication of smartphones with single-handed shakes. IEEE Trans Mob Comput 16(10):2901–2912CrossRef
15.
go back to reference Khattak ZA, Sulaiman S, Ab Manan J-L (2010) A study on threat model for federated identities in federated identity management system. In: 2010 International Symposium on Information Technology, vol 2. IEEE, pp 618–623 Khattak ZA, Sulaiman S, Ab Manan J-L (2010) A study on threat model for federated identities in federated identity management system. In: 2010 International Symposium on Information Technology, vol 2. IEEE, pp 618–623
16.
go back to reference Ghasemisharif M, Kanich C, Polakis J (2022) Towards automated auditing for account and session management flaws in single sign-on deployments. In: 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, pp 1524–1524 Ghasemisharif M, Kanich C, Polakis J (2022) Towards automated auditing for account and session management flaws in single sign-on deployments. In: 2022 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, pp 1524–1524
17.
go back to reference Karim A, Adnan MA (2019) An openid based authentication service mechanisms for internet of things. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, pp 687–692 Karim A, Adnan MA (2019) An openid based authentication service mechanisms for internet of things. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, pp 687–692
18.
go back to reference Jøsang A, Pope S (2005) User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference, vol 22. Citeseer, p 2005 Jøsang A, Pope S (2005) User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference, vol 22. Citeseer, p 2005
19.
go back to reference El Maliki T, Seigneur J-M (2007) A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007). IEEE, pp 12–17 El Maliki T, Seigneur J-M (2007) A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007). IEEE, pp 12–17
20.
go back to reference Jøsang, A., Pope, S.: User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference, vol. 22, p. 2005 (2005). Citeseer Jøsang, A., Pope, S.: User centric identity management. In: AusCERT Asia Pacific Information Technology Security Conference, vol. 22, p. 2005 (2005). Citeseer
21.
go back to reference Yang M, Zhu T, Liang K, Zhou W, Deng RH (2019) A blockchain-based location privacy-preserving crowdsensing system. Futur Gener Comput Syst 94:408–418CrossRef Yang M, Zhu T, Liang K, Zhou W, Deng RH (2019) A blockchain-based location privacy-preserving crowdsensing system. Futur Gener Comput Syst 94:408–418CrossRef
22.
go back to reference Ma Z, Jiang M, Gao H, Wang Z (2018) Blockchain for digital rights management. Futur Gener Comput Syst 89:746–764CrossRef Ma Z, Jiang M, Gao H, Wang Z (2018) Blockchain for digital rights management. Futur Gener Comput Syst 89:746–764CrossRef
23.
go back to reference Li H, Tian H, Zhang F, He J (2019) Blockchain-based searchable symmetric encryption scheme. Comput Electr Eng 73:32–45CrossRef Li H, Tian H, Zhang F, He J (2019) Blockchain-based searchable symmetric encryption scheme. Comput Electr Eng 73:32–45CrossRef
24.
go back to reference Ebrahimi A (2017) Identity management service using a blockchain providing certifying transactions between devices. Google Patents. US Patent 9,722,790 Ebrahimi A (2017) Identity management service using a blockchain providing certifying transactions between devices. Google Patents. US Patent 9,722,790
26.
go back to reference Malik N, Nanda P, Arora A, He X, Puthal D (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, pp 674–679 Malik N, Nanda P, Arora A, He X, Puthal D (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, pp 674–679
27.
go back to reference Shuaib M, Hassan NH, Usman S, Alam S, Bhatia S, Mashat A, Kumar A, Kumar M (2022) Self-sovereign identity solution for blockchain-based land registry system: a comparison. Mob Inf Syst 2022 Shuaib M, Hassan NH, Usman S, Alam S, Bhatia S, Mashat A, Kumar A, Kumar M (2022) Self-sovereign identity solution for blockchain-based land registry system: a comparison. Mob Inf Syst 2022
28.
go back to reference Stokkink Q, Pouwelse J (2018) Deployment of a blockchain-based self-sovereign identity. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1336–1342 Stokkink Q, Pouwelse J (2018) Deployment of a blockchain-based self-sovereign identity. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, pp. 1336–1342
29.
go back to reference Stokkink Q, Ishmaev G, Epema D, Pouwelse J (2021) A truly self-sovereign identity system. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, pp 1–8 Stokkink Q, Ishmaev G, Epema D, Pouwelse J (2021) A truly self-sovereign identity system. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN). IEEE, pp 1–8
31.
go back to reference Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system
32.
go back to reference Boneh D (1998) The decision diffie-hellman problem. In: International Algorithmic Number Theory Symposium. Springer, pp 48–63 Boneh D (1998) The decision diffie-hellman problem. In: International Algorithmic Number Theory Symposium. Springer, pp 48–63
33.
go back to reference Backes M, Dttling N, Hanzlik L, Kluczniak K, Schneider J (2019) Ring signatures: logarithmic-size, no setup–from standard assumptions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques Backes M, Dttling N, Hanzlik L, Kluczniak K, Schneider J (2019) Ring signatures: logarithmic-size, no setup–from standard assumptions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques
34.
go back to reference Ateniese G, Camenisch J, Joye M, Tsudik G (2000) A practical and provably secure coalition-resistant group signature scheme. In: Annual International Cryptology Conference Ateniese G, Camenisch J, Joye M, Tsudik G (2000) A practical and provably secure coalition-resistant group signature scheme. In: Annual International Cryptology Conference
36.
go back to reference Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer Peer Netw Appl 13(5):1643–1655CrossRef Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer Peer Netw Appl  13(5):1643–1655CrossRef
37.
go back to reference Guan Y, Zheng H, Shao J, Lu R, Wei G (2022) Fair outsourcing polynomial computation based on the blockchain. IEEE Trans Serv Comput 15(5):2795–2808CrossRef Guan Y, Zheng H, Shao J, Lu R, Wei G (2022) Fair outsourcing polynomial computation based on the blockchain. IEEE Trans Serv Comput 15(5):2795–2808CrossRef
38.
go back to reference Abusukhon A, Anwar MN, Mohammad Z, Alghannam B (2019) A hybrid network security algorithm based on Diffie Hellman and text-to-image encryption algorithm. J Discret Math Sci Cryptogr 22(1):65–81MathSciNetCrossRef Abusukhon A, Anwar MN, Mohammad Z, Alghannam B (2019) A hybrid network security algorithm based on Diffie Hellman and text-to-image encryption algorithm. J Discret Math Sci Cryptogr 22(1):65–81MathSciNetCrossRef
39.
go back to reference Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 552–565 Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 552–565
40.
go back to reference Abe M, Ohkubo M, Suzuki K (2002) 1-out-of-n signatures from a variety of keys. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 415–432 Abe M, Ohkubo M, Suzuki K (2002) 1-out-of-n signatures from a variety of keys. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 415–432
Metadata
Title
Non-transferable blockchain-based identity authentication
Authors
Yuxia Fu
Jun Shao
Qingjia Huang
Qihang Zhou
Huamin Feng
Xiaoqi Jia
Ruiyi Wang
Wenzhi Feng
Publication date
08-05-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01481-1

Other articles of this Issue 3/2023

Peer-to-Peer Networking and Applications 3/2023 Go to the issue

Premium Partner