Font Size: a A A

Design Research On Distributed Multi-factor Authentication Scheme Based On Blockchain

Posted on:2021-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y L MengFull Text:PDF
GTID:2428330623970854Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the key authentication stage,the authentication key exchange protocol comes into being in order to ensure the security and validity of the two parties' data.Based on the original client-server secret key authentication algorithm,this paper firstly constructs a distributed authentication system based on chaos mapping,which can resist dictionary attack and repeated attack by adding chaos mapping algorithm.The secret key information is stored in multiple servers,so that the improved algorithm has the characteristics of reliability,expandability,flexibility and efficiency of resource utilization.Based on the complexity of existing cross-domain algorithm authentication,as well as the trust and decentralization of blockchain,two kinds of universal authentication protocols based on blockchain are proposed:1.A two-unload authentication scheme for blockchain nodes is proposed.On the client side recording biometric information,we can first uninstall the server of the user registration domain,which can be stopped after the client server submits information to the blockchain service node.Secondly,when the client is a private client of the user,it can unload the blockchain service node,because it already has the public information of the user and no longer needs to request the blockchain data from the service node.With this algorithm,users no longer need to log in the servers and blockchain nodes of the registration domain,which improves the efficiency of authentication.2.Any domain server login authentication scheme is proposed.For traditional cross-domain authentication process is complex,the traditional biological certification must be under the same domain server,the process is complex and the authentication process is relatively slow,we use fuzzy extraction theory and combines the technique of block chain,and puts forward a new arbitrary domain server mode based on the block chain way of efficient user login,when the user login,we can block chain node under arbitrary domain login on the server,and save the access to the original server time.
Keywords/Search Tags:Identity authentication, Block chain technology, Biological Buzzy algorithm, Bistributed systems, Bross-domain authentication
PDF Full Text Request
Related items