Abstract

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. In addition, the user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. The user independently generates multiple-identity information, and these identities can be used to apply for an identity certificate. Authorities use the ECDSA signature algorithm and the RSA encryption algorithm to complete the distribution of the identity certificate based on the identity information and complete the registration of identity authentication through the smart contract on the blockchain. On the one hand, it can realize the protection of real identity information; on the other hand, it can avoid the storage overhead caused by the need to store a large number of certificates or key pairs. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. The security and performance analysis show that the proposed scheme can meet security requirements and is feasible.

Highlights

  • Nowadays, in the Internet of ings (IoT) environment, a massive quantity of devices and sensors can feel each other through the internet to share and process data [1,2,3]

  • (4) Upon receiving the message from pseudoidentity information (PUi), the miner verifies whether the timestamp tsr is within the allowed range compared to the current time

  • If tsa is not within the allowed range compared to the current time or the signature is invalid, Uj rejects the access request; otherwise, Uj searches for PKPUi on the blockchain with PUi

Read more

Summary

A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain

Sheng Gao ,1 Qianqian Su ,2 Rui Zhang ,2 Jianming Zhu, Zhiyuan Sui, and Junsheng Wang. Most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes difficult to expand and use in distributed situations. The user prefers to protect the privacy of their information during the identity verification process. Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. Due to the use of the blockchain, there is no single point of failure in the authentication process, and it can be applied to distributed scenarios. e security and performance analysis show that the proposed scheme can meet security requirements and is feasible

Introduction
Preliminaries
System Model
Request PK PU
The Proposed Identity Authentication Scheme
Phase 1
Phase 2
Phase 3
Security and Performance Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call