计算机科学 ›› 2018, Vol. 45 ›› Issue (11): 52-59.doi: 10.11896/j.issn.1002-137X.2018.11.006

所属专题: 区块链技术

• 综述 • 上一篇    下一篇

基于区块链的身份管理认证研究

董贵山, 陈宇翔, 张兆雷, 白健, 郝尧   

  1. (中国电子科技集团公司第三十研究所 成都610041)
  • 收稿日期:2018-01-21 发布日期:2019-02-25
  • 作者简介:董贵山(1974-),男,博士,研究员,主要研究方向为信息安全;陈宇翔(1993-),男,硕士,工程师,主要研究方向为信息安全,E-mail:chenyuxiang@std.uestc.edu.cn(通信作者);张兆雷(1985-),男,硕士,主要研究方向为信息安全;白 健(1989-),男,硕士,主要研究方向为密码学;郝 尧(1971-),男,高级工程师,主要研究方向为信息安全。
  • 基金资助:
    本文受国家重点研发计划项目:异构身份联盟与监管基础科学问题研究(2017YFB0802300)资助。

Research on Identity Management Authentication Based on Blockchain

DONG Gui-shan, CHEN Yu-xiang, ZHANG Zhao-lei, BAI Jian, HAO Yao   

  1. (No.30 Institute,China Electronics Technology Group Corporation,Chengdu 610041,China)
  • Received:2018-01-21 Published:2019-02-25

摘要: 针对网络空间中的身份管理问题,分析了通用的基于区块链的身份管理认证模型。首先,概述了身份管理的定义要求,回顾了网络空间中身份管理在区块链应用方面的早期尝试,总结了其发展经验并分析了身份管理所面临的问题,对比了区块链的优缺点及其在身份管理方面的验证项目。然后,分析了通用的区块链身份管理模型及每个模块。最后,重点对较为成熟的ShoCard公司的应用场景和DIMS(Decentralized Identity Management System)做了分析对比,并对未来进行了展望。

关键词: 区块链, 认证, 身份管理, 信息安全

Abstract: Aiming at the problem of identity management in network space,this paper analyzed a universal identity ma-nagement authentication model based on blockchain.First,the definitionand requirements of identity management in network space were outlined,and development experience and early attempts were reviewed.Then,the advantages and disadvantages of the blockchain and some kinds of proof of concepts in identity management were analyzed.Next,based on opening analysis,a general blockchain identity management model and each module were analyzed.Finally,the mature ShoCard company’s application scene and DIMS (Decentralized Identity management system) were analyzed and compared,and the prospect of the future development was put forword.

Key words: Authentication, Blockchain, Identity management, Information security

中图分类号: 

  • TP316
[1]ITU-T X.1250《Enhancing Trust and Interoperability in global identity management》..http://www.zbgb.org/129/StandardDetail2192142.htm.
[2]Christopher Allen.The Path to Self-Sovereign Identity. .http://www.coindesk.com/path-self-so-vereign-identity.
[3]MSN Historical Timeline:A brief history of milestone events in the life of MSN from the past ten years ..http://www.microsoft.com/presspass/press/2002/nov02/11-08MSN8GlobalTimeLine.mspx.
[4]STAAIJ R V D.Handboek identity & access management.Netherlands:Academic Service,2014.
[5]KONING M,KORENHOF P,ALPÁR G,et al.The ABC of ABC:an Analysis of Attribute-Based Credentials in the Light of Data Protection,Privacy and Identity∥Proceedings of the 10th International Conference on Internet,Law & Politics.2014:357-372.
[6]ALPÁR G,JACOBS B.Credential Design in Attribute-Based Identity Management.Wolf Legal Publishers,2013:189-204.
[8]胡可欣.FIDO UAF认证协议的安全性研究.合肥:中国科学技术大学,2016.
[9]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system..https://bitcoin.org/bitcoin.pdf.
[10]OneName:The Bridge Between Physical & DigitalIdentity | Blockchain for the Billions on WordPress.com...https://rywalk.wordpress.com/2015/02/13/onename-the-bridge-between-physical-digital-identity.
[11]Qiy Foundation | Technology..https://www.qiyfoundation.org/qiy-scheme/what-is-a-scheme/technology. SURF|Op SURFconext aangesloten diensten..https://www.surf.nl/ diensten-en-producten/surfconext/op-surfconext-aangesloten-diensten/index.html.
[13]ANDREW M,et al.PoC KYC on blockchain with Tradle.Tech.rep.Utrecht:Rabobank Nederland,..https://www.newsbtc.com/2015/08/24/tradle-integrating-block-chain-technology-with-kyc-requirements.
[14]Estonia’s new e-residents are surpassing the country's birth rate ..https://thenextweb.com/eu/2017/07/25/estonias-new-e-residents-surpassing-countrys-birth-rate.
[15]DJURI B.Towards Self-Sovereign Identity using Blockchain Technology ..http://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf.
[16]BERGAN T,ANDERSON O,DEVIETTI J,et al.CryptoNote v 2.0..https://cryptonote.org/whitepaper.pdf.
[17]TRAVEL identity of the future..ht- tps://shocard.com.
[18]uPort The Wallet is the New Browser - Medium. .https://medium.Com/@ ConsenSys/uport-the-wallet-is-the-new-browser-b133a83fe73%7B%5C#%7D.1l0vsfq2p.
[19]IDHub数字身份白皮书..http://www.idhub.network.
[20]SelfKey..https://selfkey.org/wp-content/uploads/2017/11/selfkey-whitepaper-en.pdf.
[21]Civic WHITEPAPER..https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf.
[22]ANTONOPOULOS A M.Mastering Bitcoin:Unlocking Digital Cryptocurrencies[M].USA:O’Reilly Media,Inc.,2014.
[23]Hyperledger.Project Charter..https://www.hyperledger.org/about/charter.
[24]ANONYMOUS.New kid on the blockchain.New Scientist,2015,225(3009):7.
[25]SWAN M.Blockchain thinking:the brain as a decentralized autonomous corporation.IEEE Technology and Society Magazine,2015,34(4):41-52.
[26]ETHEREUM White Paper.A next-generation smart contract and decentralized application platform ..https://github.com/ethereum/wiki/wiki/White Paper.
[27]Merkle R C.Protocols for Public Key Cryptosystems∥1980 IEEE Symposium on Security and Privacy.IEEE,2014:122-122.
[28]ALLISON I.Ethereum’s Vitalik Buterin explains how state channels solve privacy and scalability..http://www.ibtimes.co.uk/ethereums-vitalik-buterin-explains-how-state-channels-address-privacy-scalability-1566068.
[29]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin∥Security and Privacy.IEEE,2014:459-474.
[30]DAVID B.Blockchain revolution.Amsterdam..http://www.slideshare.net/15Mb/blockchain-revolution.
[31]DAVID B.Identity is the new Money..http://www.dgwbirch.com/words/book-identity-is-the-new.html.
[32]Scalability - Bitcoin Wiki..https://en.bitcoin.it/wiki/ Scalability.
[33]Building trust in government..https://www-01.ibm.com/ common/ssi/cgi-bin/ssialias?Htmlfid=GBE03801USEN&.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 蹇奇芮, 陈泽茂, 武晓康.
面向无人机通信的认证和密钥协商协议
Authentication and Key Agreement Protocol for UAV Communication
计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098
[3] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[4] 陈彦冰, 钟超然, 周超然, 薛凌妍, 黄海平.
基于医疗联盟链的跨域认证方案设计
Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain
计算机科学, 2022, 49(6A): 537-543. https://doi.org/10.11896/jsjkx.220200139
[5] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[8] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[9] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[10] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[11] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[12] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[13] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[14] 宋涛, 李秀华, 李辉, 文俊浩, 熊庆宇, 陈杰.
大数据时代下车联网安全加密认证技术研究综述
Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era
计算机科学, 2022, 49(4): 340-353. https://doi.org/10.11896/jsjkx.210400112
[15] 刘凯祥, 谢永芳, 陈新, 吕飞, 刘俊矫.
基于DTMC的工业串行协议状态检测算法
Industrial Serial Protocol State Detection Algorithm Based on DTMC
计算机科学, 2022, 49(3): 301-307. https://doi.org/10.11896/jsjkx.210200078
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!