Computer Science ›› 2018, Vol. 45 ›› Issue (11): 52-59.doi: 10.11896/j.issn.1002-137X.2018.11.006

Special Issue: Block Chain Technology

• Surveys • Previous Articles     Next Articles

Research on Identity Management Authentication Based on Blockchain

DONG Gui-shan, CHEN Yu-xiang, ZHANG Zhao-lei, BAI Jian, HAO Yao   

  1. (No.30 Institute,China Electronics Technology Group Corporation,Chengdu 610041,China)
  • Received:2018-01-21 Published:2019-02-25

Abstract: Aiming at the problem of identity management in network space,this paper analyzed a universal identity ma-nagement authentication model based on blockchain.First,the definitionand requirements of identity management in network space were outlined,and development experience and early attempts were reviewed.Then,the advantages and disadvantages of the blockchain and some kinds of proof of concepts in identity management were analyzed.Next,based on opening analysis,a general blockchain identity management model and each module were analyzed.Finally,the mature ShoCard company’s application scene and DIMS (Decentralized Identity management system) were analyzed and compared,and the prospect of the future development was put forword.

Key words: Authentication, Blockchain, Identity management, Information security

CLC Number: 

  • TP316
[1]ITU-T X.1250《Enhancing Trust and Interoperability in global identity management》..http://www.zbgb.org/129/StandardDetail2192142.htm.
[2]Christopher Allen.The Path to Self-Sovereign Identity. .http://www.coindesk.com/path-self-so-vereign-identity.
[3]MSN Historical Timeline:A brief history of milestone events in the life of MSN from the past ten years ..http://www.microsoft.com/presspass/press/2002/nov02/11-08MSN8GlobalTimeLine.mspx.
[4]STAAIJ R V D.Handboek identity & access management.Netherlands:Academic Service,2014.
[5]KONING M,KORENHOF P,ALPÁR G,et al.The ABC of ABC:an Analysis of Attribute-Based Credentials in the Light of Data Protection,Privacy and Identity∥Proceedings of the 10th International Conference on Internet,Law & Politics.2014:357-372.
[6]ALPÁR G,JACOBS B.Credential Design in Attribute-Based Identity Management.Wolf Legal Publishers,2013:189-204.
[8]胡可欣.FIDO UAF认证协议的安全性研究.合肥:中国科学技术大学,2016.
[9]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system..https://bitcoin.org/bitcoin.pdf.
[10]OneName:The Bridge Between Physical & DigitalIdentity | Blockchain for the Billions on WordPress.com...https://rywalk.wordpress.com/2015/02/13/onename-the-bridge-between-physical-digital-identity.
[11]Qiy Foundation | Technology..https://www.qiyfoundation.org/qiy-scheme/what-is-a-scheme/technology. SURF|Op SURFconext aangesloten diensten..https://www.surf.nl/ diensten-en-producten/surfconext/op-surfconext-aangesloten-diensten/index.html.
[13]ANDREW M,et al.PoC KYC on blockchain with Tradle.Tech.rep.Utrecht:Rabobank Nederland,..https://www.newsbtc.com/2015/08/24/tradle-integrating-block-chain-technology-with-kyc-requirements.
[14]Estonia’s new e-residents are surpassing the country's birth rate ..https://thenextweb.com/eu/2017/07/25/estonias-new-e-residents-surpassing-countrys-birth-rate.
[15]DJURI B.Towards Self-Sovereign Identity using Blockchain Technology ..http://essay.utwente.nl/71274/1/Baars_MA_BMS.pdf.
[16]BERGAN T,ANDERSON O,DEVIETTI J,et al.CryptoNote v 2.0..https://cryptonote.org/whitepaper.pdf.
[17]TRAVEL identity of the future..ht- tps://shocard.com.
[18]uPort The Wallet is the New Browser - Medium. .https://medium.Com/@ ConsenSys/uport-the-wallet-is-the-new-browser-b133a83fe73%7B%5C#%7D.1l0vsfq2p.
[19]IDHub数字身份白皮书..http://www.idhub.network.
[20]SelfKey..https://selfkey.org/wp-content/uploads/2017/11/selfkey-whitepaper-en.pdf.
[21]Civic WHITEPAPER..https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf.
[22]ANTONOPOULOS A M.Mastering Bitcoin:Unlocking Digital Cryptocurrencies[M].USA:O’Reilly Media,Inc.,2014.
[23]Hyperledger.Project Charter..https://www.hyperledger.org/about/charter.
[24]ANONYMOUS.New kid on the blockchain.New Scientist,2015,225(3009):7.
[25]SWAN M.Blockchain thinking:the brain as a decentralized autonomous corporation.IEEE Technology and Society Magazine,2015,34(4):41-52.
[26]ETHEREUM White Paper.A next-generation smart contract and decentralized application platform ..https://github.com/ethereum/wiki/wiki/White Paper.
[27]Merkle R C.Protocols for Public Key Cryptosystems∥1980 IEEE Symposium on Security and Privacy.IEEE,2014:122-122.
[28]ALLISON I.Ethereum’s Vitalik Buterin explains how state channels solve privacy and scalability..http://www.ibtimes.co.uk/ethereums-vitalik-buterin-explains-how-state-channels-address-privacy-scalability-1566068.
[29]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin∥Security and Privacy.IEEE,2014:459-474.
[30]DAVID B.Blockchain revolution.Amsterdam..http://www.slideshare.net/15Mb/blockchain-revolution.
[31]DAVID B.Identity is the new Money..http://www.dgwbirch.com/words/book-identity-is-the-new.html.
[32]Scalability - Bitcoin Wiki..https://en.bitcoin.it/wiki/ Scalability.
[33]Building trust in government..https://www-01.ibm.com/ common/ssi/cgi-bin/ssialias?Htmlfid=GBE03801USEN&.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[3] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[4] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[5] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[6] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[7] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[8] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[9] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[10] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[11] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[12] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[13] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[14] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[15] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!