首页 | 官方网站   微博 | 高级检索  
     

基于教育区块链与无证书签名的身份认证方案
引用本文:王晓欣,陈志德. 基于教育区块链与无证书签名的身份认证方案[J]. 计算机系统应用, 2022, 31(3): 178-187. DOI: 10.15888/j.cnki.csa.008407
作者姓名:王晓欣  陈志德
作者单位:福建师范大学 计算机与网络空间安全学院, 福州 350117,福建师范大学 福建省网络安全与密码技术重点实验室, 福州 350007
基金项目:广东省重点领域研发计划(2019B010137002)
摘    要:针对当前教育资源共享安全性低和身份认证困难的问题, 提出了一种区块链技术与无证书签名相结合的可跨域身份认证方案, 将无证书签名技术的高安全性、无密钥托管问题等优点应用到区块链的分布式网络中, 实现了身份认证过程中用户安全、跨域认证、恶意用户可追溯、注册信息不可篡改. 首先, 基于教育区块链与无证书签名的身份认证方案是建...

关 键 词:区块链  身份认证  无证书签名  可追踪恶意用户
收稿时间:2021-05-31
修稿时间:2021-07-05

Identity Authentication Scheme Based on Educational Blockchain and Certificateless Signature
WANG Xiao-Xin,CHEN Zhi-De. Identity Authentication Scheme Based on Educational Blockchain and Certificateless Signature[J]. Computer Systems& Applications, 2022, 31(3): 178-187. DOI: 10.15888/j.cnki.csa.008407
Authors:WANG Xiao-Xin  CHEN Zhi-De
Affiliation:College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China; Fujin Provincial Key Laboratory of Network Security and Cryptology, Fujian Norm University, Fuzhou 350007, China
Abstract:To address the low security and identity authentication difficulties of education resource sharing, this paper proposed a cross-domain identity authentication scheme based on blockchain technology and certificateless signature. The user security, cross-domain authentication, traceability of malicious users, and non-tamperable registration information were realized during the identity authentication process by the sharing of high security and no need for key escrow in the certificateless signature technology with blockchain distributed networks. First, intra-domain blockchain and cross-domain blockchain were design to facilitate the cross-domain authentication by a blockchain-based identity authentication model. Then, user safety and traceability of malicious users were guaranteed by certificateless signature and trapdoor hash functions in the authentication phase. Through the analysis, this scheme meets the security attributes such as mutual authentication and user identity security. Compared with other schemes, it has advantages in computing overhead and communication overhead. The scheme can better meet the computing environment with limited computing power on the user side.
Keywords:Blockchain  identity authentication  certificateless signature  traceable malicious user
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号