Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200079-7.doi: 10.11896/jsjkx.240200079

• Information Security • Previous Articles     Next Articles

Study on Identity Authentication Scheme of Alliance Chain Based on Multi-level Commitment Protocol

SUN Min, LI Xinyu, ZHANG Xin   

  1. School of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:SUN Min,born in 1966,master,professor.Her main research interests include blockchain and cryptography.
  • Supported by:
    This work was supported by Shanxi Province Basic Research Program,China(20210302123455,201701D121052).

Abstract: As existing schemes only support coarse-grained attribute protection policies in differentiated privacy protection scenarios,an identity authentication privacy protection scheme based on multi-level commitment protocol(Iascb-Mcp) is proposed in this paper,which aims to allow users to selectively disclose or keep secret their attribute information according to requirements,so as to meet the protection requirements in different privacy scenarios.The scheme realizes the protection of user attributes through multi-level commitment structure.First,each user attribute is assigned a privacy level,and the corresponding commitment protocol is designed according to the privacy level.Secondly,different authentication methods are adopted according to the user attributes of different privacy levels,and zero-knowledge proof is used to ensure that the user's high privacy attributes can still be effectively authenticated without being exposed.Finally,the Iascb-Mcp scheme is used to construct a system based on al-liance chain authentication,which solves the privacy authentication of off-chain user attributes and the security of transactions between different groups on the chain.The results of security analysis and experiment show that other users cannot obtain the high privacy attribute of the prover in the authentication process.Compared with the group signature scheme,the authentication time of Iascb-Mcp is reduced to 1s to 3 s.Compared with the two-ring signature scheme,the newly generated proof file is about one-tenth of the size of the original file.

Key words: Blockchain, Zero-knowledge proof, Commitment agreement, Identity authentication, Privacy protection

CLC Number: 

  • TP309
[1]LIU Y H,ZHANG J B,MUHAMMD S P,et al.Research onidentity authentication system of Internet of Things based on blockchain technology[J].Journal of King Saud University - Computer and Information Sciences,2022,34(10,Part B):10365-10377.
[2]HUANG H,ZHU P,XIAO F,et al.A blockchain-based scheme for privacy-preserving and secure sharing of medical data[J].Computers & Security,2020,99:102010.
[3]YANG X,LI W.A zero-knowledge-proof-based digital identitymanagement scheme in blockchain[J].Computers & Security,2020,99:102050.
[4]LI W,MEESE C,GUO H,et al.Blockchain-Enabled IdentityVerification for Safe Ridesharing Leveraging Zero-Knowledge Proof[C]//2020 3rd International Conference on Hot Information-Centric Networking(HotICN).2020:18-24.
[5]LIU Y,ZHOU Y,ZHANG R,et al.(Full) Leakage resilience of Fiat-Shamir signatures over lattices[J].Frontiers of Computer Science,2022,16(5):165819.
[6]WU N,XU L,ZHU L.A blockchain based access controlscheme with hidden policy and attribute[J].Future Generation Computer Systems,2023,141:186-196.
[7]CHEN B,LI X,XIANG T,et al.SBRAC:Blockchain-basedsealed-bid auction with bidding price privacy and public verifiability[J].Journal of Information Security and Applications,2022,65:103082.
[8]ŞAHIN M S,AKLEYLEK S.A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model[J].Journal of King Saud University-Computer and Information Sciences,2022,34(10,Part B):9852-9866.
[9]FENG M,LIN C,WU W,et al.SM2-DualRing:Efficient SM2-based ring signature schemes with logarithmic size[J].Compu-ter Standards & Interfaces,2024,87:103763.
[10]SANKA A I,CHEUNG R C C.A systematic review of blockchain scalability:Issues,solutions,analysis and future research[J].Journal of Network and Computer Applications,2021,195:103232.
[11]KUMARI P L S,DEVI C H S,THIVAHARAN S,et al.A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol[J].Optik,2023,273:170345.
[12]CASTELLON C,ROY S,KREIDL P,et al.Energy EfficientMerkle Trees for Blockchains[C]// IEEE The 20th International Conference on Trust,Security and Privacy in Computing and Communications(TRUSTCOM 2021).Los Alamitos:IEEE Computer Soc,2021:1093-1099.
[13]HAQ I,WANG J,ZHU Y,et al.A survey of authenticated key agreement protocols for multi-server architecture[J].Journal of Information Security and Applications,2020,55:102639.
[14]TAN P L,WANG R S,ZENG W H,et al.Overview of blockchain consensus algorithms [J].Computer Science,2023,50(S1):691-702.
[15]FIAT A,SHAMIR A.How To Prove Yourself:Practical Solutions to Identification and Signature Problems[M]//ODLYZKO A M.Advances in Cryptology-CRYPTO' 86:Vol.263.Berlin,Heidelberg:Springer Berlin Heidelberg,2006:186-194.
[16]LIPMAA H,SIIM J,ZAJAC M.Counting Vampires:From Univariate Sumcheck to Updatable ZK-SNARK[C]//Advances in Cryptology-ASIACRYPT 2022.Cham:Springer International Publishing Ag,2022:249-278.
[1] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
[2] ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411.
[3] XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446.
[4] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[5] FU Yanming, ZHANG Siyuan. Privacy Incentive Mechanism for Mobile Crowd-sensing with Comprehensive Scoring [J]. Computer Science, 2024, 51(7): 397-404.
[6] LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429.
[7] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[8] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[9] SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6.
[10] TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8.
[11] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
[12] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[13] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[14] WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9.
[15] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!