User Identity Authentication Model for Cross-Chain System
WANG Sasa, DAI Bingrong, ZHU Menglu, LI Chao
1.Shanghai Development Center of Computer Software Technology, Shanghai 201112, China
2.School of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
WANG Sasa, DAI Bingrong, ZHU Menglu, LI Chao. User Identity Authentication Model for Cross-Chain System[J]. Computer Engineering and Applications, 2022, 58(19): 135-141.
[1] 李芳,李卓然,赵赫.区块链跨链技术进展研究[J].软件学报,2019,30(6):1649-1660.
LI F,LI Z R,ZHAO H.Research on the progress in cross-chain technology of blockchains[J].Journal of Software,2019,30(6):1649-1660.
[2] NGUYEN M B,DAO T C,BA L D.Towards a blockchain-based certificate authentication system in Vietnam[J].PeerJ Computer Science,2020(6):1-27.
[3] RAKESH S,ROJEENA B,ANISH P,et al.A new-type of blockchain for secure message exchange in VANET[J].Digital Communications and Networks,2020,6(2):177-186.
[4] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.
ZHU L H,GAO F,SHEN M,et al.Survey on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.
[5] 董贵山,张兆雷,李洪伟,等.基于区块链的异构身份联盟与监管体系架构和关键机制[J].通信技术,2020,53(2):401-413.
DONG G S,ZHANG Z L,LI H W,et al.Regulatory system architecture and key mechanisms of blockchain-based heterogeneous identity alliance[J].Communications Technology,2020,53(2):401-413.
[6] CONTI M,HASSAN M,LAL C.BlockAuth:Blockchain based distributed producer authentication in ICN[J].Computer Networks,2019,164:106888.
[7] 张思亮,凌捷,陈家辉.可追踪的区块链账本隐私保护方案[J].计算机工程与应用,2020,56(23):31-37.
ZHANG S L,LING J,CHEN J H.Traceable blockchain ledger privacy protection scheme[J].Computer Engineering and Applications,2020,56(23):31-37.
[8] LIN Z,HONG L,SUN L,et al.Poster:Towards fully distributed user authentication with blockchain[C]//Proceedings of 2017 IEEE Symposium on Privacy-Aware Computing(PAC),2017:202-203.
[9] WANG W,NING H,XIN L.BlockCAM:A blockchain-based cross-domain authentication model[C]//Proceedings of 2018 IEEE Third International Conference on Data Science in Cyberspace(DSC),2018:896-901.
[10] 杨淳,李经纬,李洪伟,等.异构身份联盟统一身份标识模型研究[J].信息安全与通信保密,2019(6):27-35.
YANG C,LI J W,LI H W,et al.Research on unified identity model of heterogeneous identity federation[J].Information Security and Communication Secrecy,2019(6):27-35.
[11] SCIANCALEPORE S,PIRO G,BOGGIA G,et al.Public key authentication and key agreement in IoT devices with minimal airtime consumption[J].IEEE Embedded Systems Letters,2017,9(1):1-4.
[12] HAN J H,KIM J N.A lightweight authentication mechanism between IoT devices[C]//Proceedings of IEEE 2017 International Conference on Information & Communication Technology Convergence,2017:1153-1155.
[13] 邓小鸿,朱年红,黄磊,等.基于区块链的身份托管模型研究[J].计算机工程与应用,2020,56(4):24-30.
DENG X H,ZHU N H,HUANG L,et al.Research on identity trusteeship model based on blockchain[J].Computer Engineering and Applications,2020,56(4):24-30.
[14] GORDON W J,CATALINI C.Blockchain technology for healthcare:Facilitating the transition to patient-driven interoperability[J].Computational and Structural Biotechnology Journal,2018,16:224-230.
[15] HERLIHY M.Atomic cross-chain swaps[C]//Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing,2018:245-254.
[16] KARAN S,NIKITA S,KUSHWAHA D S.An interoperable and secure e-wallet architecture based on digital ledger technology using blockchain[C]//Proceedings of International Conference on Computing,Power and Communication Technologies,2018:168-172.
[17] YAN P.A new consensus protocol for blockchain interoperability architecture[J].IEEE Access,2020,8:153719-153730.
[18] FEIGE U,FIAT A,SHAMIR A.Zero-knowledge proofs of identity[J].Journal of Cryptology,1988,1(2):77-94.
[19] KOBLITZ N,MENEZES A,VANSTONE S.The state of elliptic curve cryptography[J].Designs,Codes and Cryptography,2000,19(2):173-193.
[20] 田松,李宝,王鲲鹏.椭圆曲线离散对数问题的研究进展[J].密码学报,2015,2(2):177-188.
TIAN S,LI B,WANG K P.On the progress of elliptic curve discrete logarithm problem[J].Journal of Cryptologic Research,2015,2(2):177-188.