Advertisement

An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain

  • Qianqian Su
  • Rui ZhangEmail author
  • Rui Xue
  • You Sun
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11512)

Abstract

Blockchain has become a hot topic in recent years. Many applications apply permissioned blockchain to achieve secure data sharing across organizations such as healthcare blockchain. In the permissioned blockchain, on the one hand, the blockchain system is required to support efficient and dynamic authentication for adding and deleting users in a distributed environment. On the other hand, in some particular applications such as healthcare domain, users prefer to keep anonymity in the process of authentication. Although many solutions for anonymous authentication have been proposed, they often require the participation of a central trusted party in the process of authentication and are not efficient enough. In this paper, we focus on designing an efficient traceable and anonymous authentication scheme, which supports efficient authentication while without revealing user’s identity information and does not requires the participation of a central trusted party. While, in case of dispute, the identity of users can be revealed. Moreover, the proposed scheme is able to support dynamic adding and deleting users. Finally, we analyze the security and privacy properties of the proposed scheme and evaluate its performance in terms of computational cost. The experimental results show that the proposed scheme is more efficient than exist schemes and can be easily deployed in the permissioned blockchain.

Keywords

Authentication Anonymous Traceable Permissioned blockchain 

Notes

Acknowledgment

The authors acknowledge the support from National Key R&D Program of China under Grant No.2017YFB1400700 and National Natural Science Foundation of China under Grant No.: 61472414, 61772514, 61602061.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Boneh, D., Boyen, X.: Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol. 21(2), 149–177 (2008)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10, 1–10 (2015)Google Scholar
  6. 6.
    He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Inf. Sci. 321, 1–6 (2013)Google Scholar
  7. 7.
    Higgins, S.: Inside R3CEV’s plot to bring distributed ledgers to wall street. https://www.coindesk.com/r3cev-distributed-ledger-wall-street
  8. 8.
    Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., Shen, X.: CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. Internet Things J. IEEE 1, 46–57 (2014)CrossRefGoogle Scholar
  9. 9.
    Lu, R., Lin, X., Luan, T.H., Liang, X., Shen, X.: Pseudonym changing at social spots: an effective strategy for location privacy in vanets. Veh. Technol. IEEE Transact. 61, 86–96 (2012)CrossRefGoogle Scholar
  10. 10.
    Ni, J., Zhang, K., Lin, X., Yang, H., Shen, X.: AMA: Anonymous mutual authentication with traceability in carpooling systems. pp. 1–6, May 2016Google Scholar
  11. 11.
    Satoshi, N.: A peer-to-peer electronic cash system (2008)Google Scholar
  12. 12.
    Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Transact. Inf. Forensics Secur. 13, 1–1 (2017)Google Scholar
  13. 13.
    Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Sebastopol (2015)Google Scholar
  14. 14.
    Tsai, J.L., Lo, N.W., Wu, T.C.: Secure handover authentication protocol based on bilinear pairings. Wirel. Pers. Commun. 73(3), 1037–1047 (2013)CrossRefGoogle Scholar
  15. 15.
    Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Transact. Dependable Secure Comput. 15, 1–22 (2016)Google Scholar
  16. 16.
    Wu, F., et al.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks: a novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Sec. Commun. Netw. 9, 3527–3542 (2016)CrossRefGoogle Scholar
  17. 17.
    Yang, G., Huang, Q., Wong, D., Deng, X.: Universal authentication protocols for anonymous wireless communications. Trans. Wireless. Comm. 9, 168–174 (2010)CrossRefGoogle Scholar
  18. 18.
    Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transact. Consum. Electron. 50, 231–235 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina

Personalised recommendations