Revocable Certificateless Cross-Domain Authentication Scheme Based on PrimarySecondary Blockchain

被引:0
|
作者
Wang, Ze [1 ,2 ]
Zong, Zhenglin [3 ]
Li, Fang [3 ]
Sun, Shimin [1 ]
Zhao, Ping [3 ]
机构
[1] Tiangong Univ, Sch Software, Tianjin 300387, Peoples R China
[2] Tianjin Key Lab Autonomous Intelligence Technol &, Tianjin 300387, Peoples R China
[3] Tiangong Univ, Sch Comp Sci & Technol, Tianjin 300387, Peoples R China
来源
关键词
Authentication; Blockchains; Authorization; Security; Hash functions; Synchronization; Servers; Certificateless cryptography (CLC); cross-domain authentication; primary-secondary blockchain; identity revocation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cross-domain interaction in social networks and mobile applications is rapidly expanding. The demand for accessing data across multiple domains from different applications is growing. Establishing robust authorization and access control mechanisms within trusted domains has become a critical foundation for data security. Despite advancements in the field of identity authentication and cross-domain access, challenges persist in various application domain transition scenarios, including cumbersome and inefficient processes, and the potential for authority misuse by malicious actors in decentralized environments. To mitigate these limitations, we propose a blockchain-based scheme that leverages consensus mechanisms to enable "one-time authentication, multidomain authorization." This scheme enhances security attributes and performance in several key aspects. First, we developed a primary-secondary chain model compatible with multiple trusted domains, where the primary chain records user authentication and authorization information, and the secondary chain logs domain-specific user identity registration information. Nodes within the primary and secondary chains reach a rapid consensus on authentication outcomes through an improved consensus algorithm. Building on this model, we devised a certificateless cross-domain identity authentication method, rendering the authentication and authorization processes more secure and efficient. Additionally, to address the issue of centralized user authority, an optimized chameleon hash function was designed to facilitate identity revocation within a multicentric environment. Furthermore, security analyses and simulation validations were conducted to assess the performance of the proposed scheme. Compared to existing approaches, our scheme demonstrates reduced computational and communication overhead, substantiating its efficacy in streamlining cross-domain interactions.
引用
收藏
页码:5880 / 5891
页数:12
相关论文
共 50 条
  • [41] Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
    Zhang, Lizhe
    Huang, Yongqiang
    Nie, Jia
    Wang, Kenian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (02): : 1467 - 1488
  • [42] A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices
    Liu, Yizhong
    Liu, Andi
    Xia, Yu
    Hu, Bin
    Liu, Jianwei
    Wu, Qianhong
    Tiwari, Prayag
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 115 - 127
  • [43] Toward Cross-Domain Dynamic Accumulator Authentication Based on Blockchain in Internet of Things
    Wang, Linjie
    Tian, Youliang
    Zhang, Duo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2858 - 2867
  • [44] Cross-domain Authentication Mechanism for Power Terminals Based on Blockchain and Credibility Evaluation
    Wang, Xinyan
    Gao, Feng
    Zhang, Jing
    Feng, Xiao
    Hu, Xing
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 936 - 940
  • [45] A Cross-Domain Authentication Protocol by Identity-Based Cryptography on Consortium Blockchain
    Wei S.-J.
    Li S.-S.
    Wang J.-H.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 908 - 920
  • [46] Cross-Domain Identity Authentication Protocol of Consortium Blockchain Based on Face Recognition
    Chen, Xiang
    Xu, Shouzhi
    Ma, Kai
    Chen, Peng
    INFORMATION, 2022, 13 (11)
  • [47] Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment
    Wang, Jiahe
    Li, Shasha
    Wei, Songjie
    BLOCKCHAIN TECHNOLOGY AND APPLICATION: SECOND CCF CHINA BLOCKCHAIN CONFERENCE (CBCC 2019), 2020, 1176 : 131 - 144
  • [48] A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof
    Du, Ruizhong
    Li, Xiaoya
    Liu, Yan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II, 2022, 13156 : 647 - 664
  • [49] A secure cross-domain authentication scheme based on threshold signature for MEC
    Chen, Lei
    Guo, Chong
    Gong, Bei
    Waqas, Muhammad
    Deng, Lihua
    Qin, Haowen
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [50] Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme
    Su, Yuan
    Wang, Yuheng
    Li, Jiliang
    Su, Zhou
    Pedrycz, Witold
    Hu, Qinnan
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (04): : 602 - 614