Abstract
To tackle the difficulty of immediate identity revocation in the identity-based cryptography (IBC) authentication system, this paper proposes an identity signature scheme by security mediator (MED), which can revoke entity. Besides, aiming at cross IBC domains authentication under large-scale network architecture, an efficient identity-based cross-domain authentication protocol via public key infrastructure (PKI) environment is presented, combining blockchain. It reduces effectively complexity by consortium blockchain, thus more available for authentication in large-scale network. Through security and performance analysis, the evaluation results show the proposed scheme introduces lower overhead in computation and communication by blockchain, with resisting various attacks and excellent security in the process of authentication, compared with other authentication protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guanqun, B.A.O., Libonate, B., Counterman, R.C.: Network-based authentication and security services. U.S. Patent Application 10/084,780, 25 September 2018
Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manage. 38(1), 42–44 (2018)
Templin, F.L., Viswanathan, K.: Secured data transmission using identity-based cryptography. U.S. Patent Application 10/326,743, 18 June 2019
Arfaoui, A., ben Letaifa, A., Kribeche, A., et al.: Adaptive anonymous authentication for wearable sensors in wireless body area networks. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 606–611. IEEE (2018)
Ghoreishi, S.M., Razak, S.A., Isnin, I.F., et al.: New secure identity-based and certificateless authenticated key agreement protocols without pairings. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188–192. IEEE (2014)
Yao, Y., Xingwei, W., Xiaoguang, S.: A cross heterogeneous domain authentication model based on PKI. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, pp. 325–329. IEEE (2011)
Hua-Xi, P.: An identity-based authentication model for multi-domain. Chin. J. Comput. 8(29), 8 (2006)
Wang, C., Liu, C., Niu, S., et al.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)
Wang, W., Hu, N., Liu, X.: BlockCAM: a blockchain-based cross-domain authentication model. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 896–901. IEEE (2018)
Cheng, Z.: Security analysis of SM9 key agreement and encryption. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 3–25. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-14234-6_1
Banga, V., Kshirsagar, A.C.: Ephemeral blockchain data structure. U.S. Patent Application 15/419,765, 2 August 2018
Tsai, W.T., Yu, L., et al.: Blockchain application development techniques. J. Softw. 28(6), 1474–1487 (2017)
Tian, Y.L., Peng, C.G., Ma, J.F., et al.: Game-theoretic mechanism for cryptographic protocol. J. Comput. Res. Dev. 51(2), 344–352 (2014)
Xie, Y.R., Ma, W.P., Luo, W.: A new cross-domain authentication model for information service entities. Comput. Sci. 45(09), 177–182 (2018)
Acknowledgments
This material is based upon work supported by the NSFC fund No. 61472189 and CERNET Innovation Project No. NGII20180103. Opinions expressed are those of the authors and do not necessarily reflect the views of the sponsors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, J., Li, S., Wei, S. (2020). Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment. In: Si, X., et al. Blockchain Technology and Application. CBCC 2019. Communications in Computer and Information Science, vol 1176. Springer, Singapore. https://doi.org/10.1007/978-981-15-3278-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-3278-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3277-1
Online ISBN: 978-981-15-3278-8
eBook Packages: Computer ScienceComputer Science (R0)