计算机科学 ›› 2021, Vol. 48 ›› Issue (11): 36-45.doi: 10.11896/jsjkx.201000002

• 区块链技术* 上一篇    下一篇

基于认证及区块链的CFL_BLP_BC模型

廉文娟1, 赵朵朵1, 范修斌1,2, 耿玉年2, 范新桐3   

  1. 1 山东科技大学计算机科学与工程学院 山东 青岛266590
    2 中国科学院软件研究所青岛分部 山东 青岛266114
    3 曲阜师范大学计算机学院 山东 日照276800
  • 收稿日期:2020-10-02 修回日期:2020-12-18 出版日期:2021-11-15 发布日期:2021-11-10
  • 通讯作者: 范修斌(fanxiubin1966@sina.com)
  • 作者简介:skd991457@sdust.edu.cn
  • 基金资助:
    青岛市社科规划项目(QDSKL2001156)

CFL_BLP_BC Model Based on Authentication and Blockchain

LIAN Wen-juan1, ZHAO Duo-duo1, FAN Xiu-bin1,2, GENG Yu-nian2, FAN Xin-tong3   

  1. 1 College of Computer Science & Engineering,Shandong University of Science and Technology,Qingdao,Shandong 266590,China
    2 Qingdao Branch,Institute of Software,Chinese Academy of Sciences,Qingdao,Shandong 266114,China
    3 School of Computer Science,Qufu Normal University,Rizhao,Shandong 276800,China
  • Received:2020-10-02 Revised:2020-12-18 Online:2021-11-15 Published:2021-11-10
  • About author:LIAN Wen-juan,born in 1977,Ph.D,associate professor,is a member of China Computer Federation.Her main research interests include deep learning,cyber security.
    FAN Xiu-bin,born in 1966,Ph.D,professor,Ph.D supervisor.His main research interests include cryptology,cyber Security.
  • Supported by:
    Qingdao Social Science Planning Project(QDSKL2001156).

摘要: 5G时代的到来给新兴信息产业的信息安全问题带来了新的挑战,现有的安全技术已不能满足5G时代下特定场景对毫秒级认证、可信认证等的相关需求。因此,以CFL技术为信息安全原点技术,提出了CFL_BLP_BC模型。CFL_BLP_BC模型在局部修改原BLP模型安全公理的基础上,结合区块链技术对该模型的基本元素、安全公理和状态转换规则进行了形式化描述。该模型不仅支持信息安全五性,而且具有毫秒级、指令级、实证制等信息安全属性。该模型支持内生安全、先天免疫、主动防御技术,可为当今网络空间新兴信息产业提供重要的理论指标。

关键词: 可信认证, CFL认证体制, 区块链, BLP模型

Abstract: The coming of 5G era brings new challenges to the information security of emerging information industries.The exis-ting security technologies can't meet the requirements of millisecond level authentication and trusted authentication for specific scenarios in 5G era.Therefore,CFL technology is taken as the origin technology of information security.Based on the local modification of the security axioms of the original BLP model,combined with the Blockchain technology,CFL_BLP_BC model formally describes the basic elements,security axioms and state transition rules of the model.The model can support the construction of five aspects of information security,and has the attributes of millisecond level,instruction level and empirical system.The model belongs to endogenous safety,innate immunity and active defense technology.The model can provide important theoretical gui-dance for theemerging information industry.

Key words: Trusted authentication, CFL authentication system, Blockchain, BLP model

中图分类号: 

  • TP399
[1]PLOUTON V.Grammatikos,Panayotis G.Cottis.IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond[S].ITU-R Recommendation M.2083-0,2015.
[2]View on 5G architecture Version 3.0[M/OL].The 5G Infra-structure Public Private Partnership Architecture Working Group,2019:18-19.https://5g-ppp.eu/wp-content/uploads/2019/07/5G-PPP-5G-Architecture-White-Paper_v3.0_PublicConsultation.pdf.
[3]ZHANG S,WANG Y,ZHOU W.Towards Secure 5G Net-works:A Survey[J].Computer Networks,2019,162:106871.
[4]SCHNEIDER P,HORN G.Towards 5G Security[C]//Trustcom/bigdatase/ispa.IEEE,2015:1165-1170.
[5]SORENSEN L T,KHAJURIA S,SKOUBY K E.5G Visions ofUser Privacy[J].IEEE Vehicular Technology Conference,2015,81(5):1-4.
[6]KUTSCHER D.It's the network:Towards better security andtransport performance in 5G[C]//2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).San Francisco,CA,2016:656-661.
[7]FAN X B,LIU X,WANG X L,et al.Identification-basedauthentication system CFL-netspace authentication and its examples[M].Beijing:Beijing University of Posts and Teleco-munications Press,2019:33-69.
[8]FAN W Z,FAN Y N,HE Z Z,et al.CFL_BLP model[J].Journal of Taishan University,2018,40(6):60-66.
[9]DU C L,LIU J M,FAN X B,et al.CFL is Statistical Zero-Knowledge Proof System[J].Journal of Information Security Research,2016,2(7):621-627.
[10]QIN H B,PAN Y J,FAN X B,et al.Analysis on CFL Provable Security[J].Journal of Information Security Research,2016,2(7):589-599.
[11]FAN X B.New generation of identity authentication technology CFL[J].Journal of Information Security Research,2016,2(7):587-588.
[12]LI C C,JI S W,FAN X B,et al.The Overview of Authentication Systems[J].Journal of Information Security Research,2016,2(7):649-659.
[13]DU C L,FAN X B.CFL Authentication System and Its Applications in the Blockchain[J].Journal of Information Security Research,2017,3(3):220-226.
[14]BELL D E,LAPADULA L J.Secure Computer Systems:AMathematical Model[J].The MITRE Corporation,1973,2:239-263.
[15]NOFER M,GOMBER P,HINZ O,et al.Blockchain[J].Busi-ness & Information Systems Engineering,2017,59(3):183-187.
[16]ZHENG Z B,XIE S A.Blockchain challenges and opportunities:a survey[J].International Journal of Web and Grid Services,2018,14(4):352-375.
[17]WANG Y,SHEN Y,WANG H,et al.MtMR:Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications[J].IEEE Transactions on Big Data,2016,4(3):418-431.
[18]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[19]LI Q,TAN Y,YU X,et al.Resear on Blockchain Authentication Based on CFL[C]//Proceedings of the 6th China command and Control Conference (Volume 2).2018:587-589.
[20]SHU Z X,LI T F,YU X,et al.Research on cfl-based blockchain system authentication Mechan-ism[J].Application Research of Computers,2020,38(2):1-10.
[21]LI Q,SHU Z X,YU X,et al.Authentication Mechanism inBlockchain Systems[J].Journal of Command and Control,2019(1):1-17.
[22]YAN S J,MIN L Q,FAN X B.Researchon the knowledge security[J].Journal on Communications,2014,35(Z2):204-211.
[23]YAN S J,FAN X B,CHEN Y G,et al.Construction of Narrow Security Knowledge Base[J].Information Security and Communications Privac,2015(6):99-103.
[24]Ten academicians unveil BCS 2019 Qian xin first proposes the concept of “SECURITY:BUILT-IN DNA”[J].China Information Security,2019(9):102.
[25]FERNANDES D A B,FREIRE M M,FAZENDEIRO P A P,et al.Applications of artificial immune systems to computer security:A survey[J].Journal of Information Security & Applications,2017,35:138-159.
[26]ZHANG B.Research on key Technologies of Interactive and Attack Proactive Defense in Edge-computing Network [D].Nanjing:Guniversity of Science & Technology,2019.
[27]LUO Y B.Research on Proactive Defense of Computer Network[D].Hunan:National University of Defense Technology,2017.
[28]IFTEKHAR A,TAHMIN N,SHAHINA S U,et al.Protection of Sensitive Data in Zero Trust Model[C]//Proceedings of the International Conference on Computing Advancements (ICCA 2020).Association for Computing Machinery,New York,NY,USA,2020,63:1-5.
[29]ZHANG H G,JIA C F,LIN J Q.Foreword of trusted computing for autonomous security and controllability[J].Journal of Software,2019,30(8):2227-2228.
[1] 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪. 基于区块链的工业控制系统角色委派访问控制机制[J]. 计算机科学, 2021, 48(9): 306-316.
[2] 王日宏, 周航, 徐泉清, 张立锋. 用于联盟链的非拜占庭容错共识算法[J]. 计算机科学, 2021, 48(9): 317-323.
[3] 张小艳, 李秦伟, 付福杰. 基于数字承诺的区块链交易金额保密验证方法[J]. 计算机科学, 2021, 48(9): 324-329.
[4] 周艺华, 贾玉欣, 贾立圆, 方嘉博, 侍伟敏. 基于红黑树的共享电子病历数据完整性验证方案[J]. 计算机科学, 2021, 48(9): 330-336.
[5] 刘嘉琪, 刘贝丽, 彭韬, 段江, 康立, 陈智. 基于区块链的音频版权存证模型[J]. 计算机科学, 2021, 48(6A): 438-442.
[6] 唐飞, 陈云龙, 冯卓. 基于区块链和代理重加密的电子处方共享方案[J]. 计算机科学, 2021, 48(6A): 498-503.
[7] 李嘉明, 赵阔, 屈挺, 刘晓翔. 基于知识图谱的区块链物联网领域研究分析[J]. 计算机科学, 2021, 48(6A): 563-567.
[8] 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281.
[9] 王卫红, 陈震宇. 基于改进区块链的智能制造安全模型[J]. 计算机科学, 2021, 48(2): 295-302.
[10] 季钰翔, 黄建华, 王喆, 郑红, 唐瑞琮. 基于信任度匹配的改进PBFT共识算法[J]. 计算机科学, 2021, 48(2): 303-310.
[11] 闫凯伦, 张继连. 一种可用于数据和模型分享的模型链[J]. 计算机科学, 2021, 48(2): 311-316.
[12] 毛瀚宇, 聂铁铮, 申德荣, 于戈, 徐石成, 何光宇. 区块链即服务平台关键技术及发展综述[J]. 计算机科学, 2021, 48(11): 4-11.
[13] 李玉, 段宏岳, 殷昱煜, 高洪皓. 基于区块链的去中心化众包技术综述[J]. 计算机科学, 2021, 48(11): 12-27.
[14] 陈先来, 赵晓宇, 曾工棉, 安莹. 基于区块链的患者在线交流模型[J]. 计算机科学, 2021, 48(11): 28-35.
[15] 刘峰, 王一帆, 杨杰, 周爱民, 齐佳音. 一种基于区块链的融合DKG与BLS的高阈值签名协议[J]. 计算机科学, 2021, 48(11): 46-53.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 周文辉, 石敏, 朱登明, 周军. 基于残差注意力网络的地震数据超分辨率方法[J]. 计算机科学, 2021, 48(8): 24 -31 .
[2] 王梓强, 胡晓光, 李晓筱, 杜卓群. 移动机器人全局路径规划算法综述[J]. 计算机科学, 2021, 48(10): 19 -29 .
[3] 刘天星, 李伟, 许铮, 张立华, 戚骁亚, 甘中学. 面向高维连续行动空间的蒙特卡罗树搜索算法[J]. 计算机科学, 2021, 48(10): 30 -36 .
[4] 张建行, 刘全. 基于情节经验回放的深度确定性策略梯度方法[J]. 计算机科学, 2021, 48(10): 37 -43 .
[5] . 目录[J]. 计算机科学, 2021, 48(11): 0 .
[6] 高洪皓, 郑子彬, 殷昱煜, 丁勇. 区块链技术专题序言[J]. 计算机科学, 2021, 48(11): 1 -3 .
[7] 毛瀚宇, 聂铁铮, 申德荣, 于戈, 徐石成, 何光宇. 区块链即服务平台关键技术及发展综述[J]. 计算机科学, 2021, 48(11): 4 -11 .
[8] 李玉, 段宏岳, 殷昱煜, 高洪皓. 基于区块链的去中心化众包技术综述[J]. 计算机科学, 2021, 48(11): 12 -27 .
[9] 陈先来, 赵晓宇, 曾工棉, 安莹. 基于区块链的患者在线交流模型[J]. 计算机科学, 2021, 48(11): 28 -35 .
[10] 刘峰, 王一帆, 杨杰, 周爱民, 齐佳音. 一种基于区块链的融合DKG与BLS的高阈值签名协议[J]. 计算机科学, 2021, 48(11): 46 -53 .