Font Size: a A A

Research On The Identity Authentication Mechanism Based On Block-chain

Posted on:2021-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:C Y LuoFull Text:PDF
GTID:2428330611960396Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the advent of a more open digital era and the increase in the number of mobile terminals,the increasing demand for users to access the network for identity authentication also faces many problems.However,most of the traditional authentication mechanism is a centralized authentication method,which needs to rely on a trusted third-party authentication server,and there are a lot of security problems such as tampered data.Blockchain technology has the characteristics of decentralized data tamper-proof and traceability,which can make up for the deficiency of traditional identity authentication mechanism.Therefore,how to apply blockchain technology to identity authentication has become a hot topic in recent years.In order to solve the problems existing in the traditional identity authentication mechanism,this paper introduces the emerging technology of blockchain,studies the identity authentication mechanism based on blockchain,and uses the features of blockchain decentralization,openness and transparency to make up for the shortcomings of the traditional identity authentication mechanism.Based on this mechanism,the consensus algorithm is improved,and it is proposed to use the existing nodes in the P2 P network to authenticate the keys of the nodes that are about to apply to join the network.The main work and research contents of this paper are as follows:1.This paper analyzes the existing problems of the traditional identity authentication mechanism and studies the identity authentication mechanism based on blockchain.This mechanism has the characteristics of decentralization,openness,and transparency.Two nodes can authenticate without adding trust and get authentic and reliable authentication results.2.By introducing consensus algorithm mechanism,the traditional practical Byzantine fault-tolerant algorithm is improved.In P2 P network,existing nodes are used to authenticate the key of nodes to be applied to join the network,and the authentication result will form a consensus scheme.Not only get rid of the reliance on the central authentication server but also get more reliable authentication results.3.This paper the data structure of "block + chain" in the blockchainto ensure that the authentication result cannot be falsified,tampered with,and can be traced back,while the identity authentication result is recorded in the network.Using Java language to build a P2 P network experimental platform to verify the effectiveness of the identity authentication mechanism proposed in this paper.The experiments show that this paper proposes a blockchain-based identity authentication mechanism that effectively reduces the identity authentication delay and ensures that the authentication results are authentic and reliable.Finally,the work of this paper is summarized and the next steps in the direction of work are introduced.
Keywords/Search Tags:P2P network, blockchain, identity authentication, decentralization
PDF Full Text Request
Related items