Font Size: a A A

Research On Enhanced Privacy Computing Identity Authentication Mechanism Based On Blockchain

Posted on:2024-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:P JiangFull Text:PDF
GTID:2558307058952499Subject:Engineering
Abstract/Summary:PDF Full Text Request
Digital identity authentication is the cornerstone of network information security and the first checkpoint for network system security,playing an important role in ensuring system security.Early centralized identity authentication schemes were vulnerable to single point of failure,hacker attacks,and other security issues,which cannot meet the current security needs of people for network services.Blockchain technology provides new solutions and directions for identity authentication.The integration of blockchain technology in identity authentication eliminates the reliance on central institutions and centralized servers,reduces the risk of identity information leakage and identity theft,and ensures the security and tamper-resistance of identity verification.Therefore,combining blockchain technology with identity authentication has become a highly anticipated research hotspot.Currently,blockchain-based identity authentication research programs can be divided into two categories: distributed identity authentication based on blockchain and self-sovereign identity(SSI)authentication based on blockchain.The former achieves selective storage of identity in the blockchain,where the identity is authenticated by authoritative institutions or other entities in the blockchain.The latter eliminates the need for external authoritative institutions or other entities,providing users with complete ownership of personal data,enabling them to better control private data and protect personal right s.Although blockchain technology has the potential to alleviate some of the limitations of traditional identity authentication,there are still challenges that need to be addressed in blockchain-based identity authentication systems,such as the lack of complete decentralization,the inability to ensure the quality of user data sources,which can lead to wasted computing power for identity providers,vulnerability to sybil attacks,and lower practicality and security of the system.This article focuses on the field of identity authentication and conducts in-depth research on blockchain-based identity authentication.The main work is as follows:1.This article first studies and analyzes typical blockchain-based identity authentication protocols such as Sho Card,u Port,and Sovrin,and establishes a security and functional requirement pool that an effective identity authentication protocol should have.Then,based on the security and functional requirements pool,this paper proposes an enhanced privacy computing identity authentication scheme that supports trusted data sources and is resistant to sybil attacks.This scheme addresses the security issues and deficiencies in the authentication process between users and identity providers in blockchain-based identity authentication,by utilizing technologies such as identity authentication,blockchain,cryptography,and trusted execution environments.Specifically,the scheme uses trusted execution environments and blockchain technology to support trusted data sources,ensuring the security and reliability of the scheme and the openness and transparency of the authentication process.It allows users to freely choose authoritative institutions to provide their identity information,improving t he flexibility of the scheme.By limiting the unique identity of user attributes,it achieves resistance to sybil attacks,and adopts an oblivious transfer extension protocol to ensure the privacy of data transmission in a distributed network.2.This article provides security proof and performance analysis for the proposed scheme.Firstly,the security of the proposed scheme is theoretically proven,and it is shown to be provably secure under the random Oracle model.Secondly,simulation experiments and evaluations are conducted on the critical operations of the scheme,such as obtaining trusted data,distributing certificates,and verifying certificates.The results show that the performance of the scheme is excellent.Finally,the proposed scheme is compared and analyzed with typical blockchain-based identity authentication protocols,and the results show that the proposed scheme has higher reliability,flexibility,and security,and can effectively meet the security and functional requirements of an effective identity authentication protocol.In conclusion,this article explores the schemes and key technologies for identity authentication in network information systems,delves into the knowledge related to blockchain-based identity authentication,and designs an enhanced privacy computing identity authentication mechanism based on blockchain.This provides a new approach for designing and implementing highly secure and trustworthy identity authentication mechanisms.
Keywords/Search Tags:Identity authentication, Blockchain technology, Trusted sources of data, Anti-sybil attacks, Enhanced privacy computing
PDF Full Text Request
Related items