Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment
- 12 Downloads
To tackle the difficulty of immediate identity revocation in the identity-based cryptography (IBC) authentication system, this paper proposes an identity signature scheme by security mediator (MED), which can revoke entity. Besides, aiming at cross IBC domains authentication under large-scale network architecture, an efficient identity-based cross-domain authentication protocol via public key infrastructure (PKI) environment is presented, combining blockchain. It reduces effectively complexity by consortium blockchain, thus more available for authentication in large-scale network. Through security and performance analysis, the evaluation results show the proposed scheme introduces lower overhead in computation and communication by blockchain, with resisting various attacks and excellent security in the process of authentication, compared with other authentication protocols.
KeywordsIdentity-based signature Blockchain Security mediator Cross-domain Identity authentication
This material is based upon work supported by the NSFC fund No. 61472189 and CERNET Innovation Project No. NGII20180103. Opinions expressed are those of the authors and do not necessarily reflect the views of the sponsors.
- 1.Guanqun, B.A.O., Libonate, B., Counterman, R.C.: Network-based authentication and security services. U.S. Patent Application 10/084,780, 25 September 2018Google Scholar
- 3.Templin, F.L., Viswanathan, K.: Secured data transmission using identity-based cryptography. U.S. Patent Application 10/326,743, 18 June 2019Google Scholar
- 4.Arfaoui, A., ben Letaifa, A., Kribeche, A., et al.: Adaptive anonymous authentication for wearable sensors in wireless body area networks. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 606–611. IEEE (2018)Google Scholar
- 5.Ghoreishi, S.M., Razak, S.A., Isnin, I.F., et al.: New secure identity-based and certificateless authenticated key agreement protocols without pairings. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188–192. IEEE (2014)Google Scholar
- 6.Yao, Y., Xingwei, W., Xiaoguang, S.: A cross heterogeneous domain authentication model based on PKI. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, pp. 325–329. IEEE (2011)Google Scholar
- 7.Hua-Xi, P.: An identity-based authentication model for multi-domain. Chin. J. Comput. 8(29), 8 (2006)Google Scholar
- 8.Wang, C., Liu, C., Niu, S., et al.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)Google Scholar
- 9.Wang, W., Hu, N., Liu, X.: BlockCAM: a blockchain-based cross-domain authentication model. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 896–901. IEEE (2018)Google Scholar
- 11.Banga, V., Kshirsagar, A.C.: Ephemeral blockchain data structure. U.S. Patent Application 15/419,765, 2 August 2018Google Scholar
- 13.Tian, Y.L., Peng, C.G., Ma, J.F., et al.: Game-theoretic mechanism for cryptographic protocol. J. Comput. Res. Dev. 51(2), 344–352 (2014)Google Scholar
- 14.Xie, Y.R., Ma, W.P., Luo, W.: A new cross-domain authentication model for information service entities. Comput. Sci. 45(09), 177–182 (2018)Google Scholar