Font Size: a A A

Method And Application Research On Identity Authentication And Access Control Based On Blockchain

Posted on:2020-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:W J AoFull Text:PDF
GTID:2518306548493704Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology,the Internet profoundly influences and changes people's life.While informatization has brought convenience to people,the ensuing information security issues have become more and more prominent,which has been widely concerned by people.Identity authentication and access control,as an important part of information security technology,play an important role in protecting information security.Most of the existing identity authentication systems and access control systems adopt the centralized scheme relying on the trusted third parties,such as the third-party key distribution center and the third-party certificate authority,etc.,which have some inherent problems of centralized systems,such as single point of failure and poor transparency,and face serious security challenges.Blockchain is the underlying technology of digital currencies,such as Bitcoin and ETH.Because of the advantages of decentralization,trustworthiness,anonymity and immutability,blockchain is suitable for identity authentication and access control.This paper studies the application of blockchain in the field of identity authentication and access control.The main innovative work includes:(1)An identity authentication scheme based on blockchain and identity-based cryptography is proposed.The decentralized private key generator is established by deploying smart contracts on the Ethereum,and the process of identity authentication is completed by using IBC and challenge-response protocol.The advantages of decentralization,trustworthiness,anonymity and immutability of blockchain can help prevent the problem of single point of failure.The use of the identity-based cryptography avoids the complex certificate management and complex certificate usage process.The scheme can resist impersonation attack,man-in-the-middle attack and replay attack.(2)An identity authentication scheme based on blockchain and certificateless public key cryptosystem is proposed.The decentralized key generating centre is established by deploying smart contracts on the Ethereum,and the process of identity authentication is completed by using certificateless public key cryptosystem and HMAC algorithm.The scheme relies on blockchain to prevent problem of single point of failure.The use of the CL-PKC not only avoids the complex certificate management and complex certificate usage process,but also gets rid of the key escrow problem.And the scheme can resist impersonation attack and man in the middle attack.(3)A privacy protection and sharing scheme of electronic health record based on blockchain and ciphertext-policy attribute-based Encryption.The distributed database of the EHR is established by using the distributed architecture of blockchain.The CPABE algorithm realizes the fine-grained access control.And the scheme can solve the problems of fragmentation,ownership dislocation and fine-grained access control of EHR.
Keywords/Search Tags:Blockchain, Identity Authentication, Access Control, Identity-Based Cryptography, Certificateless Public Key Cryptography
PDF Full Text Request
Related items