Skip to main content

Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment

  • Conference paper
  • First Online:
Blockchain Technology and Application (CBCC 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1176))

Included in the following conference series:

Abstract

To tackle the difficulty of immediate identity revocation in the identity-based cryptography (IBC) authentication system, this paper proposes an identity signature scheme by security mediator (MED), which can revoke entity. Besides, aiming at cross IBC domains authentication under large-scale network architecture, an efficient identity-based cross-domain authentication protocol via public key infrastructure (PKI) environment is presented, combining blockchain. It reduces effectively complexity by consortium blockchain, thus more available for authentication in large-scale network. Through security and performance analysis, the evaluation results show the proposed scheme introduces lower overhead in computation and communication by blockchain, with resisting various attacks and excellent security in the process of authentication, compared with other authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guanqun, B.A.O., Libonate, B., Counterman, R.C.: Network-based authentication and security services. U.S. Patent Application 10/084,780, 25 September 2018

    Google Scholar 

  2. Lozupone, V.: Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manage. 38(1), 42–44 (2018)

    Article  Google Scholar 

  3. Templin, F.L., Viswanathan, K.: Secured data transmission using identity-based cryptography. U.S. Patent Application 10/326,743, 18 June 2019

    Google Scholar 

  4. Arfaoui, A., ben Letaifa, A., Kribeche, A., et al.: Adaptive anonymous authentication for wearable sensors in wireless body area networks. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 606–611. IEEE (2018)

    Google Scholar 

  5. Ghoreishi, S.M., Razak, S.A., Isnin, I.F., et al.: New secure identity-based and certificateless authenticated key agreement protocols without pairings. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188–192. IEEE (2014)

    Google Scholar 

  6. Yao, Y., Xingwei, W., Xiaoguang, S.: A cross heterogeneous domain authentication model based on PKI. In: 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, pp. 325–329. IEEE (2011)

    Google Scholar 

  7. Hua-Xi, P.: An identity-based authentication model for multi-domain. Chin. J. Comput. 8(29), 8 (2006)

    Google Scholar 

  8. Wang, C., Liu, C., Niu, S., et al.: An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 723–728. IEEE (2017)

    Google Scholar 

  9. Wang, W., Hu, N., Liu, X.: BlockCAM: a blockchain-based cross-domain authentication model. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 896–901. IEEE (2018)

    Google Scholar 

  10. Cheng, Z.: Security analysis of SM9 key agreement and encryption. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 3–25. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-14234-6_1

    Chapter  Google Scholar 

  11. Banga, V., Kshirsagar, A.C.: Ephemeral blockchain data structure. U.S. Patent Application 15/419,765, 2 August 2018

    Google Scholar 

  12. Tsai, W.T., Yu, L., et al.: Blockchain application development techniques. J. Softw. 28(6), 1474–1487 (2017)

    MathSciNet  Google Scholar 

  13. Tian, Y.L., Peng, C.G., Ma, J.F., et al.: Game-theoretic mechanism for cryptographic protocol. J. Comput. Res. Dev. 51(2), 344–352 (2014)

    Google Scholar 

  14. Xie, Y.R., Ma, W.P., Luo, W.: A new cross-domain authentication model for information service entities. Comput. Sci. 45(09), 177–182 (2018)

    Google Scholar 

Download references

Acknowledgments

This material is based upon work supported by the NSFC fund No. 61472189 and CERNET Innovation Project No. NGII20180103. Opinions expressed are those of the authors and do not necessarily reflect the views of the sponsors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiahe Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Li, S., Wei, S. (2020). Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment. In: Si, X., et al. Blockchain Technology and Application. CBCC 2019. Communications in Computer and Information Science, vol 1176. Springer, Singapore. https://doi.org/10.1007/978-981-15-3278-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3278-8_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3277-1

  • Online ISBN: 978-981-15-3278-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics