Advertisement

Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment

  • Jiahe WangEmail author
  • Shasha Li
  • Songjie Wei
Conference paper
  • 12 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 1176)

Abstract

To tackle the difficulty of immediate identity revocation in the identity-based cryptography (IBC) authentication system, this paper proposes an identity signature scheme by security mediator (MED), which can revoke entity. Besides, aiming at cross IBC domains authentication under large-scale network architecture, an efficient identity-based cross-domain authentication protocol via public key infrastructure (PKI) environment is presented, combining blockchain. It reduces effectively complexity by consortium blockchain, thus more available for authentication in large-scale network. Through security and performance analysis, the evaluation results show the proposed scheme introduces lower overhead in computation and communication by blockchain, with resisting various attacks and excellent security in the process of authentication, compared with other authentication protocols.

Keywords

Identity-based signature Blockchain Security mediator Cross-domain Identity authentication 

Notes

Acknowledgments

This material is based upon work supported by the NSFC fund No. 61472189 and CERNET Innovation Project No. NGII20180103. Opinions expressed are those of the authors and do not necessarily reflect the views of the sponsors.

References

  1. 1.
    Guanqun, B.A.O., Libonate, B., Counterman, R.C.: Network-based authentication and security services. U.S. Patent Application 10/084,780, 25 September 2018Google Scholar
  2. 2.
    Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manage. 38(1), 42–44 (2018)CrossRefGoogle Scholar
  3. 3.
    Templin, F.L., Viswanathan, K.: Secured data transmission using identity-based cryptography. U.S. Patent Application 10/326,743, 18 June 2019Google Scholar
  4. 4.
    Arfaoui, A., ben Letaifa, A., Kribeche, A., et al.: Adaptive anonymous authentication for wearable sensors in wireless body area networks. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 606–611. IEEE (2018)Google Scholar
  5. 5.
    Ghoreishi, S.M., Razak, S.A., Isnin, I.F., et al.: New secure identity-based and certificateless authenticated key agreement protocols without pairings. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188–192. IEEE (2014)Google Scholar
  6. 6.
    Yao, Y., Xingwei, W., Xiaoguang, S.: A cross heterogeneous domain authentication model based on PKI. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, pp. 325–329. IEEE (2011)Google Scholar
  7. 7.
    Hua-Xi, P.: An identity-based authentication model for multi-domain. Chin. J. Comput. 8(29), 8 (2006)Google Scholar
  8. 8.
    Wang, C., Liu, C., Niu, S., et al.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)Google Scholar
  9. 9.
    Wang, W., Hu, N., Liu, X.: BlockCAM: a blockchain-based cross-domain authentication model. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 896–901. IEEE (2018)Google Scholar
  10. 10.
    Cheng, Z.: Security analysis of SM9 key agreement and encryption. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 3–25. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-14234-6_1CrossRefGoogle Scholar
  11. 11.
    Banga, V., Kshirsagar, A.C.: Ephemeral blockchain data structure. U.S. Patent Application 15/419,765, 2 August 2018Google Scholar
  12. 12.
    Tsai, W.T., Yu, L., et al.: Blockchain application development techniques. J. Softw. 28(6), 1474–1487 (2017)MathSciNetGoogle Scholar
  13. 13.
    Tian, Y.L., Peng, C.G., Ma, J.F., et al.: Game-theoretic mechanism for cryptographic protocol. J. Comput. Res. Dev. 51(2), 344–352 (2014)Google Scholar
  14. 14.
    Xie, Y.R., Ma, W.P., Luo, W.: A new cross-domain authentication model for information service entities. Comput. Sci. 45(09), 177–182 (2018)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringNanjing University of Science and TechnologyNanjingChina

Personalised recommendations