Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220700158-9.doi: 10.11896/jsjkx.220700158
• Information Security • Previous Articles Next Articles
LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu
CLC Number:
[1]SMITH R G,National identity security strategy estimating the cost to Australian businesses of identity crime and misuse[OL].https://www.aic.gov.au. [2]Personal information security and privacy protection in China[R].CYU Internet Law Research Center,2016. [3]KHODAEI M,JIN H,PAPADIMITRATOS P.SECMACE:Scalable and robust identity and credential management infrastructure in vehicular communication systems[J].IEEE Tran-sactions on Intelligent Transportation Systems,2018,19(5):1430-1444. [4]CHENG X,ZHANG Z,CHEN F,et al.Secure identity authentication of community medical Internet of things[J].IEEE Access,2019,2019(7):115966-115977. [5]NAKAMOTO S,Bitcoin:A peer-to-peer electronic cash system,White Paper,2008[OL].https://bitcoin.org/bitcoin.pdf. [6]CAI X,DENG Y,ZHANG L,et al.The principle and core technology of blockchain[J].Chinese Journal of Computers,2021,44(5):84-131. [7]ANTONOPOULOS A M.Mastering Bitcoin:Unlocking digitalcryptocurrencies[M].O’Reilly Media,Inc.,Sebastopol,USA,2014. [8]SLOMOVIC A.Privacy issues in identity verification[J].IEEE Security & Privacy,2014,12(3):71-73. [9]WALT E,ELOFF J.A Big Data Science Experiment-IdentityDeception Detection[C]//International Conference on Computational Science & Computational Intelligence.IEEE,2015:416-419. [10]ZOU Y,ROUNDY K,TAMERSOY A,et al.Examining theadoption and abandonment of security,privacy,and identity theft protection practices[C]//Proceedings of the CHI Conference on Human Factors in Computing Systems.Honolulu USA,2020:1-15. [11]AKHTAR Z,HADID A,NIXON M S,et al.Biometrics:Insearch of identity and security(Q&A)[J].IEEE Multimedia,2018,25(3):22-35. [12]ESTEE V D W,ELOFF J H P,GROBLER J.Cyber-security:Identity deception detection on social media platforms[J].Computers & Security,2018,78(sep.):76-89. [13]HE D,ZHANG Y,DING W,et al.Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography[J].IEEE Transactions on Dependable and Secure Computing,2018,17(5):1124-1132. [14]CHEN J,HAO G,LIANG Y.Strongly secure identity-based authenticated key agreement protocols without bilinear pairings[J].Information Sciences,2016,367(Nov.):176-193. [15]DANIEL R M,RAJSINGH E B,SILAS S.An efficient eCK secure identity based two party authenticated key agreement scheme with security against active adversaries[J].Information and Computation,2020,275(Dec.):1-20. [16]DENG Y,SONG G,YANG B,et al.Identity-based inner product functional encryption with verified secret key[J].Chinese Journal of Computers,2021,44(5):908-920. [17]MEZRAG F,BITAM S,MELLOUK A.IDSP:A new identity-based security protocol for cluster-based wireless sensor networks[C]//Proceedings of the IEEE 30th Annual International Symposium on Personal,Indoor and Mobile Radio Communications.Istanbul,Turkey,2019:1-6. [18]KAI H,JIAN W,LIU J N,et al.Anonymous identity-basedbroadcast encryption with chosen-ciphertext security[C]//Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.Xi’an China,2016:207-222. [19]KHAN R,KUMAR P,JAYAKODY D,et al.,A survey on security and privacy of 5G technologies:potential solutions,recent advancements and future directions[J].IEEE Communications Surveys & Tutorials,2019,22(1):196-248. [20]WANG Z.A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity[J].Future Generations Computer Systems,2018,82:342-348. [21]WANG H,HE D,YU J,et al.Incentive and unconditionallyanonymous identity-based public provable data possession[J].IEEE Transactions on Services Computing,2019,12(5):824-835. [22]JIA X,HE D,KUMAR N,et al.A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing[J].IEEE Systems Journal,2019,14(1):1560-571. [23]ZHANG C Y,KIM D,HWANG I.Multi-target Identity Ma-nagement for Unknown and Time-Varying Number of Targets in Clutter[J].European Journal of Control,2021,60:20-35. [24]NIU J L,REN Z Y.A self-sovereign identity managementscheme using smart contracts[J].MATEC Web of Confe-rences,2021,336:08005. [25]SONG L,SUN G,YU H,et al.FBIA:A fog-based identity authentication scheme for privacy preservation in Internet of vehicles[J].IEEE Transactions on Vehicular Technology,2020,69(5):5403-5415. [26]WANG Z.An identity-based data aggregation protocol for the smart grid[J].IEEE Transactions on Industrial Informatics,2017,13(5):2428-2435. [27]KARATI A,ISLAM S H,BISWAS G P,et al.,Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of things environments[J].IEEE Internet of Things Journal,2018,5(4):2904-2914. [28]DUNPHY P,PETITCOLAS F.A first look at identity management schemes on the Blockchain[J].IEEE Security and Privacy Magazine,2018,16(4):20-29. [29]XU K,LING S,LI Q,et al.Research progress of network secu-rity architecture and key technologies based on blockchain[J].Chinese Journal of Computers,2021,44(5):55-83. [30]Hyperledger Indy:Hyperledger-Powered Digital Identity Solu-tions[OL].https://www.hyperledger.org/use/hyperledger-indy. [31]XU J,XUE K,TIAN H,et al.An identity management and authentication scheme based on redactable blockchain for mobile networks[J].IEEE Transactions on Vehicular Technology,2020,69(6):6688-6698. [32]YANG X,LI W.A zero-knowledge-proof-based digital identity management scheme in blockchain[J].Computers & Security,2020,99(Dec.):1-17. [33]CUI Z,XUE F,ZHANG S,et al.A hybrid blockchain-basedidentity authentication scheme for multi-WSN[J].IEEE Tran-sactions on Services Computing,2020,13(2):241-251. [34]YANG X,YANG X,YI X,et al.Blockchain-based secure andlightweight authentication for Internet of things[J].IEEE Internet of things Journal,2022,9(5):3321-3332. [35]MALIK N,NANDA P,ARORA A,et al.Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks[C]//Proceedings of the 17th IEEE International Confe-rence on Trust,Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering.New York,NY,USA,2018:674-679. [36]WANG S S,MA Z F,LIU J W,et al.Research and Implementation of Cross Chain Security Access and Identity Authentication Scheme of Blockchain[J].Netinfo Security,2022,22(6):61-72. [37]WANG S S,DAI B R,ZHU M L,et al.User Identity Authentication Model for Cross-Chain System[J].Computer Engineering and Applications,2022,58(19):135-141. [38]REN X,LIN F,CHEN Z,et al.BIA:A blockchain-based identity authorization mechanism[C]//Proceedings of the IEEE 16th International Conference on Mobility,Sensing and Networking.Tokyo,Japan,2020:98-105. |
[1] | WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371. |
[2] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[3] | TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12. |
[4] | ZHENG Hong, QIAN Shihui, LIU Zerun, DU Wen. Formal Verification of Supply Chain Contract Based on Coloured Petri Nets [J]. Computer Science, 2023, 50(6A): 220300220-7. |
[5] | HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6. |
[6] | PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6. |
[7] | XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312. |
[8] | LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329. |
[9] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
[10] | PEI Cui, FAN Guisheng, YU Huiqun, YUE Yiming. Auction-based Edge Cloud Deadline-aware Task Offloading Strategy [J]. Computer Science, 2023, 50(4): 241-248. |
[11] | LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322. |
[12] | LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333. |
[13] | CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350. |
[14] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[15] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
|