An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain
Blockchain has become a hot topic in recent years. Many applications apply permissioned blockchain to achieve secure data sharing across organizations such as healthcare blockchain. In the permissioned blockchain, on the one hand, the blockchain system is required to support efficient and dynamic authentication for adding and deleting users in a distributed environment. On the other hand, in some particular applications such as healthcare domain, users prefer to keep anonymity in the process of authentication. Although many solutions for anonymous authentication have been proposed, they often require the participation of a central trusted party in the process of authentication and are not efficient enough. In this paper, we focus on designing an efficient traceable and anonymous authentication scheme, which supports efficient authentication while without revealing user’s identity information and does not requires the participation of a central trusted party. While, in case of dispute, the identity of users can be revealed. Moreover, the proposed scheme is able to support dynamic adding and deleting users. Finally, we analyze the security and privacy properties of the proposed scheme and evaluate its performance in terms of computational cost. The experimental results show that the proposed scheme is more efficient than exist schemes and can be easily deployed in the permissioned blockchain.
KeywordsAuthentication Anonymous Traceable Permissioned blockchain
The authors acknowledge the support from National Key R&D Program of China under Grant No.2017YFB1400700 and National Natural Science Foundation of China under Grant No.: 61472414, 61772514, 61602061.
- 2.Hyperledger. https://www.hyperledger.org
- 5.Gope, P., Hwang, T.: Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Syst. J. 10, 1–10 (2015)Google Scholar
- 6.He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Inf. Sci. 321, 1–6 (2013)Google Scholar
- 7.Higgins, S.: Inside R3CEV’s plot to bring distributed ledgers to wall street. https://www.coindesk.com/r3cev-distributed-ledger-wall-street
- 10.Ni, J., Zhang, K., Lin, X., Yang, H., Shen, X.: AMA: Anonymous mutual authentication with traceability in carpooling systems. pp. 1–6, May 2016Google Scholar
- 11.Satoshi, N.: A peer-to-peer electronic cash system (2008)Google Scholar
- 12.Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Transact. Inf. Forensics Secur. 13, 1–1 (2017)Google Scholar
- 13.Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Sebastopol (2015)Google Scholar
- 15.Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Transact. Dependable Secure Comput. 15, 1–22 (2016)Google Scholar
- 16.Wu, F., et al.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks: a novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Sec. Commun. Netw. 9, 3527–3542 (2016)CrossRefGoogle Scholar