Font Size: a A A

Research On Identity Authentication Mechanism Of Science And Technology Service Based On Alliance Chain

Posted on:2024-08-31Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZhuFull Text:PDF
GTID:2568307118950759Subject:Electronic information
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology in today’s era,the science and technology service industry is also receiving more and more attention,and various science and technology service platforms have emerged,effectively promoting scientific and technological innovation and facilitating the transformation of scientific and technological achievements.However,the traditional science and technology service platform is based on centralized management,there is a risk of identity information leakage,it is difficult to ensure the authenticity of user identity.Secondly,users need to upload the necessary identity information for proof during identity authentication,but these identity information data lack security protection measures,resulting in user privacy is vulnerable to leakage.To solve the above problems and ensure the security and credibility of the identity information of technology service users is a top priority for technology service platforms.Thesis proposes a technology service identity authentication mechanism based on alliance chain to address the issue of vulnerable disclosure of identity information for users of the technology service platform mentioned above.The distributed identity trustworthy authentication is realized by using the partial decentralization of the alliance chain,and the identity certificate of users is realized by combining PKI technology,and the identity authentication function is realized by using RSA digital signature technology to ensure the authenticity of users’ identity.At the same time,cryptographic techniques such as Pedersen commitment and zero-knowledge proof are used to cryptographically verify the specific data of identity information and realize the identity privacy protection of users of technology services.The main tasks are as follows.1.To address the problem of the risk of identity information leakage and the difficulty in determining the authenticity of user identity in the centralized management of technology service platforms,blockchain technology is explored and a technology service identity authentication mechanism based on the alliance chain is proposed.Through the partial decentralization feature of the coalition chain,the PBFT consensus algorithm is used to perform consensus authentication of the identity information uploaded by the users of the technology service,and the digital certificate management is combined with the PKI technology.At the same time,the asymmetric algorithm RSA is used for digital signature to complete the identity authentication function to ensure that the user’s identity is true and trustworthy,thus solving the problem of centralization of the traditional technology service platform.2.In order to solve the problem of lack of privacy protection measures for identity information uploaded during the authentication process,combining cryptographic theories and tools,zero knowledge proof is proposed to be applied to the blockchain.Hiding specific information about the identity of technology service users in the Pedersen commitment,and using Bulletproof to construct zero knowledge range proof,enabling verifiers to confidentially verify the authenticity of user identity information without obtaining sensitive information.Thereby ensuring that the identity and privacy of technology service users are not disclosed.3.Combined with the identity authentication model based on the federated chain,a technology service identity authentication system was designed and implemented.Through the black box testing method,the system was tested for functionality and throughput.The test results show that the system can respond to requests quickly and show good performance,which meets the requirements of the technology service application scenario and can achieve credible identity authentication and meet the expected objectives of the system design.
Keywords/Search Tags:Scientific and Technological Services, Alliance Chain, Identity Authentication, Identity Privacy Protection, Zero Knowledge Proof
PDF Full Text Request
Related items