CN110661816B - Cross-domain authentication method based on block chain and electronic equipment - Google Patents

Cross-domain authentication method based on block chain and electronic equipment Download PDF

Info

Publication number
CN110661816B
CN110661816B CN201911007278.0A CN201911007278A CN110661816B CN 110661816 B CN110661816 B CN 110661816B CN 201911007278 A CN201911007278 A CN 201911007278A CN 110661816 B CN110661816 B CN 110661816B
Authority
CN
China
Prior art keywords
certificate
slave
certification authority
master
commitment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911007278.0A
Other languages
Chinese (zh)
Other versions
CN110661816A (en
Inventor
李桐
吴骏泽
姜勇
钟林
解凯
杨斌
郭静如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Beijing Institute of Graphic Communication
Original Assignee
Beihang University
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University, Beijing Institute of Graphic Communication filed Critical Beihang University
Priority to CN201911007278.0A priority Critical patent/CN110661816B/en
Publication of CN110661816A publication Critical patent/CN110661816A/en
Application granted granted Critical
Publication of CN110661816B publication Critical patent/CN110661816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a block chain-based cross-domain authentication method and electronic equipment, which are realized based on a given cross-domain authentication system, wherein the given cross-domain authentication system comprises a main authentication mechanism, a slave authentication mechanism, a user side and a verifier, and the method comprises the following steps: the master certification authority generates a public parameter, a master key and a master public key, and generates and distributes a slave key of the slave certification authority to the slave certification authority based on the master key; the slave certification authority signs a certificate to the user side according to the slave secret key, and the user side accepts the certificate if the certificate is verified to be valid; the certification authority promises and sends the certification to the user side, and the user side accepts the certification if the certification is valid; signing the promise by the slave certification authority and broadcasting the promise to the blockchain system, and storing other slave certification authorities if the signatures are verified to be valid; the user side sends the commitment and the verification information to the verifier, and the verifier receives the identity information of the user if the commitment is verified to be valid. The embodiment of the invention can realize high-efficiency cross-domain authentication and can strictly supervise the slave authentication mechanism.

Description

Cross-domain authentication method based on block chain and electronic equipment
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a block chain-based cross-domain authentication method and an electronic device.
Background
The internet is an open system, and the openness of the system causes a plurality of security holes, threats and privacy problems. Various resources in the network are easily accessed illegally by attackers to cause economic loss and the like, so that the information service provider is very important to carry out the legality authentication on the identity of the network resource accessor.
Identity authentication is a process of determining the validity of the identity of an information service entity, and the process is a basic defense line of network security. As information service resources and information service types are more and more, users need to log in different information service systems to complete different tasks. These information services systems consist of multiple different trust domains, each with one or more independent certificate authorities. The current application requirements require that certificates issued by users in different trust domains can be authenticated in other trust domains, namely, cross-domain authentication is realized.
Public Key Infrastructure (PKI) is a general security Infrastructure that provides secure information services based on Public Key cryptography. In the PKI-based cross-domain authentication, a certificate is generated, issued, managed, archived, and the like by a trusted third party, i.e., a certificate authority. In addition, the trusted third party needs to provide security services for the work related to the certificate, such as authentication, authorization, encryption, decryption, signature, and the like for the network application. But the authentication process generates a large number of digital certificates, and the certificate management cost is huge.
In the identity-based cross-domain authentication technology, a string of character strings with characteristic information is generally used for representing a user and is used as a public key of the user, and a digital certificate is not needed for authenticating the user through the identity character string, so that huge certificate management is avoided. However, the public key of the user requires the certification authority to sign, and the certification process requires the participation of the certification authority. Thus, authentication requires that the certification authority, user, and information service provider be on-line at the same time to complete the task.
Under the development and popularization of 5G mobile wireless networks, wireless internet is rapidly developed, and most users in the internet are mobile users. In the current 5G mobile internet application scene, a network is divided into a plurality of pieces, and when a user moves rapidly among the pieces, the user is required to be capable of switching rapidly among different trust domains so as to acquire information services on the internet system through a wireless network.
However, due to the above limitations of the conventional identity authentication technology, it is obviously unable to meet the efficiency requirement in the new scenario, and meanwhile, the security and fairness of the authentication process are not guaranteed. Therefore, how to design a safer and faster cross-domain authentication technology is a key problem to be researched urgently.
Disclosure of Invention
In order to overcome the above problems or at least partially solve the above problems, embodiments of the present invention provide a block chain-based cross-domain authentication method and an electronic device, so as to effectively improve the processing efficiency and security of cross-domain authentication for a user.
In a first aspect, an embodiment of the present invention provides a block chain-based cross-domain authentication method, where the block chain-based cross-domain authentication method is implemented based on a given cross-domain authentication system, where the given cross-domain authentication system includes a master authentication mechanism, a slave authentication mechanism, a user side, and a verifier, and the block chain-based cross-domain authentication method includes:
selecting safety parameters to sequentially generate public parameters and a master public key and a master secret key of the master certification authority by using the master certification authority, generating a slave secret key of the slave certification authority based on the master secret key, and distributing the slave secret key to the slave certification authority;
generating a slave public key of the slave certification authority according to the slave secret key by using the slave certification authority, generating a certificate based on the slave public key, signing to the user side so that the user side can verify whether the certificate is valid, and accepting the certificate when the certificate is valid;
utilizing the slave certification authority to commit the certificate, sending the certificate commitment and verification information generated by the commitment to the user side so that the user side can verify whether the certificate commitment is valid or not, and accepting the certificate commitment and the verification information when the certificate commitment and the verification information are valid;
signing the certificate promise signature by utilizing the slave certification authority, broadcasting the promise signature generated by the signature into a blockchain system for other slave certification authorities to verify whether the promise signature is valid, and storing the promise signature into the blockchain system when the promise signature is valid;
the user side is utilized to send the certificate, the certificate acceptance and the verification information to the verifier so that the verifier can verify whether the certificate acceptance is valid or not, and when the certificate acceptance is valid, the identity information of the user corresponding to the user side is received;
and tracking the identity information of the slave certification authority by using the master certification authority, and extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to realize cross-domain certification.
Optionally, the step of selecting, by using the master certificate authority, a security parameter to generate a public parameter, a master public key and a master secret key of the master certificate authority, generating, based on the master secret key, a slave secret key of the slave certificate authority, and distributing to the slave certificate authority specifically includes: and the main authentication mechanism is utilized to complete the following processing flows in sequence:
selecting a safety parameter 1λAnd based on the safety parameter 1λGenerating a public parameter Param by adopting a system parameter generation algorithm SysGen;
generating a master public key gmpk and a master key gmsk of the master certification authority by adopting a key generation algorithm KGen based on a public parameter Param, and generating a slave key gsk of the slave certification authority by adopting a key generation algorithm KGen based on the master key gmsk;
the step of generating, by the slave certificate authority, a slave public key of the slave certificate authority from the slave key specifically includes: and generating a slave public key gpk of the slave certification authority by using a key generation algorithm KGen based on a slave key gsk of the slave certification authority by using the slave certification authority.
Optionally, the step of generating a certificate based on the slave public key and signing the certificate to the user side so that the user side can verify whether the certificate is valid, and accepting the certificate when the certificate is valid specifically includes:
utilizing the slave certification authority, based on the slave key gsk of the slave certification authority, the master public key gmpk of the master certification authority and the identity information ID of the user corresponding to the user endjAdopting a group signature algorithm GSig to generate a certificate Cert to sign and send the certificate Cert to the user side;
utilizing the user side according to the master public key gmpk and the identity information ID of the userjAnd a certificate Cert, which adopts a verification algorithm Gser to verify whether the certificate Cert is valid;
and if the output of the verification algorithm Gver is Valid, determining that the certificate Cert is Valid and accepting the certificate Cert, and if the output of the verification algorithm Gver is Invalid, determining that the certificate Cert is Invalid and rejecting the certificate Cert.
Optionally, the committing the certificate by using the secondary certification authority, and sending the certificate commitment and the verification information generated by the commitment to the user side, so that the user side verifies whether the certificate commitment is valid, and when the certificate commitment and the verification information are verified to be valid, the step of accepting the certificate commitment and the verification information specifically includes:
generating certificate acceptance and verification information (psi, pi) by using the slave certification authority according to the master public key gmpk of the master certification authority, the public key gpk of the slave certification authority and the certificate Cert by using an acceptance algorithm TECom, and sending the certificate acceptance and verification information (psi, pi) to the user side;
verifying whether the certificate acceptance psi is valid or not by using the user side through a verification algorithm TEVer according to the master public key gmpk of the master certification authority, the certificate Cert, the certificate acceptance and the verification information psi, pi;
if the output of the verification algorithm TEVer is Valid, it is determined that the certificate acceptance ψ is Valid and the certificate acceptance and verification information (ψ, π) is accepted, and if the output of the verification algorithm TEVer is Invalid, it is determined that the certificate acceptance ψ is Invalid and the certificate acceptance and verification information (ψ, π) is rejected.
Optionally, the signing the certificate commitment by using the slave certification authority, and broadcasting a commitment signature generated by the signing to the blockchain system, so that other slave certification authorities verify whether the commitment signature is valid, and when the commitment signature is valid, storing the commitment signature in the blockchain system specifically includes:
generating a commitment signature sigma by using the slave certification authority according to a slave key gssk of the slave certification authority, a master public key gmpk of the master certification authority and a certificate commitment psi by adopting a group signature algorithm GSig and broadcasting the commitment signature sigma into a blockchain system;
verifying whether the commitment signature sigma is valid or not by using the other slave certification authorities and adopting a verification algorithm Gver according to the master public key gmpk, the certificate commitment psi and the commitment signature sigma of the master certification authority;
and if the output of the verification algorithm Gver is Valid, determining that the commitment signature sigma is Valid and storing the commitment signature sigma into the blockchain system, and if the output of the verification algorithm Gver is Invalid, determining that the commitment signature sigma is Invalid and rejecting the commitment signature sigma.
Optionally, the step of sending, by using the user side, the certificate acceptance and the verification information to the verifier, so that the verifier verifies whether the certificate acceptance is valid, and when the certificate acceptance is valid, receiving the identity information of the user corresponding to the user side specifically includes:
sending a certificate Cert and certificate acceptance and verification information (ψ, π) to the verifier by using the user side;
verifying whether the certificate acceptance psi is valid or not by using the verifier according to the master public key gmpk of the master certification authority, the certificate Cert and the certificate acceptance and verification information psi, pi by adopting a verification algorithm TEVer;
and if the output of the verification algorithm TEVer is Valid, determining that the certificate acceptance psi is Valid and accepting the identity information of the user corresponding to the user side, and if the output of the verification algorithm TEVer is Invalid, determining that the certificate acceptance psi is Invalid and rejecting the identity information of the user corresponding to the user side.
Optionally, the step of tracking, by using the master certification authority, the identity information of the slave certification authority specifically includes: and tracking a slave key gsk of the slave certification authority by using the master certification authority according to a master key gmsk and a commitment signature sigma of the master certification authority by adopting a tracking algorithm Trace, and identifying the identity information of the slave certification authority based on the slave key gsk.
Optionally, the step of extracting the certificate from the certificate commitment to implement cross-domain authentication by using the master certification authority and the slave certification authority respectively includes:
extracting a certificate Cert by using the main certification authority and adopting an extraction algorithm Extract according to a main key gmsk of the main certification authority and a certificate commitment psi;
and extracting the certificate Cert by using the slave certification authority by adopting an extraction algorithm Extract according to the slave key gsk of the slave certification authority and the certificate acceptance psi.
In a second aspect, an embodiment of the present invention provides a block chain-based cross-domain authentication system, including a master authentication mechanism, a slave authentication mechanism, a user side, and a verifier, where:
the master certification authority is used for selecting safety parameters, sequentially generating public parameters and a master public key and a master secret key of the master certification authority based on the safety parameters, generating a slave secret key of the slave certification authority based on the master secret key, distributing the slave secret key to the slave certification authority, tracking identity information of the slave certification authority, and extracting the certificate from the certificate commitment to realize cross-domain certification;
the slave certification authority is used for generating a slave public key of the slave certification authority according to the slave secret key, generating a certificate based on the slave public key, signing the certificate to the user side, committing the certificate, sending the certificate commitment and verification information generated by the commitment to the user side, signing the certificate commitment, broadcasting the commitment signature generated by the signature to the block chain system, so that other slave certification authorities can verify whether the commitment signature is valid or not, storing the commitment signature to the block chain system when the commitment signature is valid, and extracting the certificate from the certificate commitment to realize cross-domain certification;
the user side is used for verifying whether the certificate is valid, accepting the certificate when the certificate is valid, verifying whether the certificate acceptance is valid, accepting the certificate acceptance and the verification information when the certificate acceptance is valid, and sending the certificate, the certificate acceptance and the verification information to the verifier;
the verifying party is used for verifying whether the certificate commitment is valid or not and receiving the identity information of the user corresponding to the user side when the certificate commitment is valid.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the steps of the block chain-based cross-domain authentication method according to the first aspect.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which computer instructions are stored, and when the computer instructions are executed by a computer, the steps of the block chain based cross-domain authentication method according to the first aspect are implemented.
According to the block chain-based cross-domain authentication method and the electronic device provided by the embodiment of the invention, the certificate issuance, the certificate acceptance and the acceptance signature in the cross-domain authentication process are realized by using the slave authentication mechanism, so that the cross-domain authentication is independent of the master authentication mechanism, and a user can quickly verify the identity information of the user only by verifying the certificate issued by the slave authentication mechanism, the acceptance of the certificate and the acceptance signature, thereby effectively improving the processing efficiency of the cross-domain authentication. Meanwhile, by broadcasting the commitment signature to the block chain system, strict supervision of a slave certification authority can be realized, and the safety and the fairness of the certification process are guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a cross-domain authentication system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a block chain-based cross-domain authentication method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a block chain-based cross-domain authentication method according to another embodiment of the present invention;
fig. 4 is a schematic diagram of a basic cryptography tool in a block chain-based cross-domain authentication method according to an embodiment of the present invention;
fig. 5 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention without any creative efforts belong to the protection scope of the embodiments of the present invention.
Aiming at the problems of low cross-domain authentication efficiency and lack of supervision in the prior art, the embodiment of the invention realizes the certificate issuance, certificate acceptance and acceptance signature in the cross-domain authentication process by utilizing the slave authentication mechanism, so that the cross-domain authentication is independent of the master authentication mechanism, and a user can quickly verify the identity information of the user only by verifying the certificate issued by the slave authentication mechanism, the acceptance of the certificate and the acceptance signature, thereby effectively improving the processing efficiency of the cross-domain authentication. Meanwhile, by broadcasting the commitment signature to the block chain system, strict supervision of a slave certification authority can be realized, and the safety and the fairness of the certification process are guaranteed. Embodiments of the present invention will be described and illustrated with reference to various embodiments.
As an aspect of the embodiment of the present invention, an embodiment of the present invention provides a block chain-based cross-domain authentication method, which can be implemented based on a cross-domain authentication system, and as shown in fig. 1, is a schematic structural diagram of the cross-domain authentication system provided in the embodiment of the present invention, where the cross-domain authentication system includes a master authentication mechanism, a slave authentication mechanism, a user side, and a verifier. As shown in fig. 2, a schematic flow chart of a block chain-based cross-domain authentication method according to an embodiment of the present invention is provided, where the method includes:
s201, selecting safety parameters by using a master certification authority to sequentially generate public parameters, a master public key and a master secret key of the master certification authority, generating a slave secret key of the slave certification authority based on the master secret key, and distributing the slave secret key to the slave certification authority.
It can be understood that, in the embodiment of the present invention, by controlling each execution unit in the cross-domain authentication system to execute corresponding operations according to a certain execution order, the cross-domain authentication of the user is finally realized. In this execution sequence, the corresponding initialization operation is first performed with the master certification authority. Specifically, the security parameters are selected by the main certificate authority, and then the public parameters, the main public key of the main certificate authority and the main secret key are sequentially generated based on the security parameters. The master certification authority then generates a slave key for the slave certification authority from the master key of the master certification authority and distributes the slave key to the slave certification authority.
S202, generating a slave public key of the slave certification authority according to the slave secret key by using the slave certification authority, generating a certificate based on the slave public key, signing to the user side so that the user side can verify whether the certificate is valid, and receiving the certificate when the certificate is valid.
It is understood that, after monitoring the slave key of the slave certification authority sent by the master certification authority received from the certification authority, the slave certification authority generates the slave public key of the slave certification authority according to the slave key of the slave certification authority. Thereafter, a certificate is generated from the certificate authority and sent to the user terminal. And after receiving the certificate, the user side verifies whether the certificate is valid, and if so, the user side receives the certificate to start the next authentication process. Optionally, if the certificate is verified to be invalid, the user terminal rejects the certificate, and the authentication fails.
S203, using the subordinate certification authority to commit the certificate, and sending the certificate commitment and verification information generated by the commitment to the user side, so that the user side can verify whether the certificate commitment is valid, and when the certificate commitment and verification information are valid, the user side receives the certificate commitment and verification information.
It is understood that, after the user terminal is monitored to accept the certificate, the certificate is committed by the certificate authority, and the certificate commitment and the verification information generated by the commitment are transmitted to the user terminal. After receiving the certificate acceptance and the verification information, the user side verifies whether the certificate acceptance is valid, and if so, the user side receives the certificate acceptance and the verification information to start the next authentication process. Optionally, if the certificate acceptance is verified to be invalid, the user end rejects the certificate acceptance and verification information, and the authentication fails.
S204, the subordinate certification authority is used for signing the commitment of the certificate, the commitment signature generated by the signature is broadcasted to the blockchain system, so that other subordinate certification authorities can verify whether the commitment signature is valid or not, and when the commitment signature is valid, the commitment signature is stored in the blockchain system.
It is understood that, after the acceptance of the certificate acceptance and verification information by the user terminal is monitored, the acceptance certificate is signed by the certificate authority, and the acceptance signature generated by the signature is broadcasted to the blockchain system. The other slave certification authorities read the commitment signature from the blockchain system and verify whether the commitment signature is valid, and if so, the other slave certification authorities store the commitment signature in the blockchain system. Optionally, if the commitment signature is verified to be invalid, the other slave certification authorities reject the commitment signature, and the certification fails.
S205, the user side is utilized to send the certificate, the certificate acceptance and the verification information to the verifier, so that the verifier can verify whether the certificate acceptance is valid or not, and when the verification is valid, the identity information of the user corresponding to the user side is received.
It is to be understood that the certificate, certificate acceptance and verification information are sent to the verifier using the user side after monitoring other commitment signatures stored in the blockchain system from the certification authority. After receiving the certificate, the certificate acceptance and the verification information, the verifier verifies whether the certificate acceptance is valid or not, and if so, the verifier receives the identity information of the user corresponding to the user side to start the next authentication process. Optionally, if the verifier verifies that the certificate acceptance is invalid, the verifier rejects the certificate acceptance, and the authentication fails.
S206, tracking the identity information of the slave certification authority by using the master certification authority, and extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to realize cross-domain certification.
It can be understood that, in the embodiment of the present invention, after it is monitored that the verifier receives the identity information corresponding to the user side, the master certification authority is used to track the identity information of the slave certification authority, and the master certification authority and the tracked slave certification authority extract the certificate from the certificate acceptance to implement the cross-domain certification.
According to the block chain-based cross-domain authentication method provided by the embodiment of the invention, the certificate issuance, the certificate acceptance and the acceptance signature in the cross-domain authentication process are realized by using the slave authentication mechanism, so that the cross-domain authentication is independent of the master authentication mechanism, and a user can quickly verify the identity information of the user only by verifying the certificate issued by the slave authentication mechanism, the acceptance of the certificate and the acceptance signature, thereby effectively improving the processing efficiency of the cross-domain authentication. Meanwhile, by broadcasting the commitment signature to the block chain system, strict supervision of a slave certification authority can be realized, and the safety and the fairness of the certification process are guaranteed.
Optionally, according to the foregoing embodiments, the steps of selecting, by using the master certificate authority, the security parameter to generate the public parameter, the master public key and the master secret key of the master certificate authority, generating, based on the master secret key, the slave secret key of the slave certificate authority, and distributing to the slave certificate authority specifically include: the following processing flows are completed in sequence by using a main authentication mechanism:
selecting a safety parameter 1λAnd based on the safety parameter 1λGenerating a public parameter Param by adopting a system parameter generation algorithm SysGen;
and generating a master public key gmpk and a master key gmsk of the master certification authority by adopting a key generation algorithm KGen based on the public parameter Param, and generating a slave key gsk of the slave certification authority by adopting a key generation algorithm KGen based on the master key gmsk.
The step of generating, with the slave certification authority, a slave public key of the slave certification authority from the slave key specifically includes: the slave certification authority is used for generating a slave public key gpk of the slave certification authority by adopting a key generation algorithm KGen based on a slave key gsk of the slave certification authority.
It can be appreciated that since the PPCA scheme of embodiments of the present invention requires cross-domain authentication of certificates and tracking of certification authorities, a group signature algorithm is introduced to achieve this goal. The group signature is that the group members sign the message, the verifier can carry out effective verification, and the group administrator can also carry out identity tracking on the signer. Order (G)1,G1) Is a symmetric bilinear group pair, zeta is group G1To group G1Isomorphic mapping of (c), hash function H0:{0,1}*→Zp. SDH complexity is assumed to be in bilinear groups (G)1,G1) The above holds, the decision linearity is assumed to be in group G1In the above, e is (G)1,G1) Symmetric bilinear mapping of (c).
For the system parameter generation algorithm SysGen of the embodiment of the invention, the system security parameter is lambda, and the group membership is n. Group administrator in group G1In randomly selecting generator g2Let g1←ζ(g2). In group G1In randomly selecting generator
Figure BDA00022431497000001111
Randomly selecting xi1
Figure BDA00022431497000001112
Let u, v ∈ G1And satisfy
Figure BDA0002243149700000111
Random selection
Figure BDA0002243149700000112
Order to
Figure BDA0002243149700000113
For the key generation algorithm KGen of the present embodiment, the group administrator generates SDH doublet (a) of each member using γi,xi) Random selection of
Figure BDA0002243149700000114
And order
Figure BDA0002243149700000115
The group public key (i.e., master public key) and the group private key (i.e., master secret key) of the group administrator are gmpk ═ g, respectively1,g2,h,u,v,ω),gmsk=(ξ1,ξ2) The private key (i.e., the slave key) of the group member is gski=(Ai,xi)。
Specifically, the embodiment of the present invention implements initialization processing of authentication data by using a master authentication authority. The master certification authority selects a system security parameter lambda, which is generated as a bilinear group pair (G) using a BDH parameter generator G1,G1) Zeta is group G1To group G1Isomorphic mapping of (c). SDH complexity is assumed to be in bilinear groups (G)1,G1) The above holds, and the decision linearity is assumed to be in group G1The above is true. The number of group members is n, e is a symmetric bilinear group (G)1,G1) Bilinear mapping of (c). H0,H1,H2,H3Is four hash functions, H0:{0,1}n→Zp,H1:G1→{0,1}n,H2:{0,1}n→{0,1}n
Figure BDA0002243149700000116
Master authenticationMechanism in group G1In randomly selecting generator g2Let g1←ζ(g2). In group G1In randomly selecting generator
Figure BDA00022431497000001113
Random selection
Figure BDA0002243149700000117
Let u, v ∈ G1And satisfy
Figure BDA0002243149700000118
Random selection
Figure BDA0002243149700000119
Order to
Figure BDA00022431497000001110
The master public key and the master private key of the master certificate authority are gmpk ═ (g), respectively1,g2,h,u,v,ω),gmsk=(ξ1,ξ2)。
The master certification authority randomly selects a private key, i.e. a slave key, for each slave certification authority using gamma
Figure BDA0002243149700000121
And order
Figure BDA0002243149700000122
Binary (A) over a secure channeli,xi) To the slave certification authority i. From the certification authority by xiFor input, calculate
Figure BDA0002243149700000123
Therefore, any slave certification authority i, 1 ≦ i ≦ n slave public and private keys are gski=(Ai,xi),
Figure BDA0002243149700000124
1≤i≤n。
Optionally, according to the foregoing embodiments, the step of generating a certificate based on the public key and signing the certificate to the user side so that the user side verifies whether the certificate is valid, and accepting the certificate when the certificate is valid specifically includes:
using the slave certification authority, based on the slave key gsk of the slave certification authority, the master public key gmpk of the master certification authority and the identity information ID of the user corresponding to the user endjAdopting a group signature algorithm GSig to generate a certificate Cert to sign and send the certificate Cert to a user side;
by using the user side, according to the master public key gmpk and the identity information ID of the userjAnd a certificate Cert, which adopts a verification algorithm Gser to verify whether the certificate Cert is valid;
and if the output of the verification algorithm Gver is Valid, determining that the certificate Cert is Valid and accepting the certificate Cert, and if the output of the verification algorithm Gver is Invalid, determining that the certificate Cert is Invalid and rejecting the certificate Cert.
It will be appreciated that for the group signature algorithm GSig in embodiments of the present invention, a group public key gmpk is given (g ═ g)1,g2H, u, v, ω), the private key gsk of group member ii=(Ai,xi) And message M ∈ {0, 1}*Group membership i is calculated as follows:
firstly, a random number alpha, beta epsilon Z is selectedpAnd based on this, the following calculation is carried out: t is1←uα,T2←vβ,T3←Ai·hα+β,δ1←xi·α,δ2←xi·β;
Next, a random number r is selectedα,rβ,rx
Figure BDA0002243149700000125
And based thereon the following calculations are made:
Figure BDA0002243149700000126
again, using a hash function, the challenge value c is calculated as follows: c ← H0(M,T1,T2,T3,R1,R2,R3,R4,R5)∈Zp
Then, a random number r is usedα,rβ
Figure BDA0002243149700000127
And challenge value c, calculated as follows:
Figure BDA0002243149700000128
finally, the output signature is σ, where
Figure BDA0002243149700000129
For the verification algorithm GVer in the embodiment of the invention, a group public key gmpk ═ (g) is given1,g2H, u, v, ω), message M, and group signature σ, the following verification process is performed:
first, calculate
Figure BDA0002243149700000131
Figure BDA0002243149700000132
Second, the detection equation
Figure BDA0002243149700000133
Whether or not this is true. If the equation is true, the signature is accepted, otherwise rejected.
Specifically, embodiments of the present invention first utilize issuing a certificate from a certificate authority. The slave certification authority i uses its private key gski=(Ai,xi) And the master certification authority public key gmpk ═ g1,g2H, u, v, ω) and user-provided identity information IDjFor input, the following calculations are made:
firstly, a random number alpha, beta epsilon Z is selectedpAnd calculating T as follows1,T2,T3,δ1,δ2:T1←uα,T2←vβ,T3←Ai·hα+β,δ1←xi·α,δ2←xi·β;
Next, a random number r is selectedα,rβ
Figure BDA00022431497000001312
And separately calculate R1,R2,R3,R4,R5The following were used:
Figure BDA0002243149700000134
thirdly, according to the identity information ID provided by the userjThe challenge value c is calculated using a hash function: c ← H0(IDj,T1,T2,T3,R1,R2,R3,R4,R5)∈Zp
Then, a random number is used
Figure BDA0002243149700000135
And a challenge value c, calculating sα,sβ
Figure BDA0002243149700000136
Figure BDA00022431497000001313
Finally, the public key certificate is exported
Figure BDA0002243149700000137
And then, the embodiment of the invention utilizes the user terminal to verify the certificate. The user information is IDjThe user end uses the public key gmpk ═ (g) of the main certification authority1,g2H, u, v, ω), its identity information IDjAnd certificate Certi,jFor input, the following verification process is performed:
first, parameters are calculated respectively in the following calculation manner
Figure BDA0002243149700000138
Figure BDA0002243149700000139
Figure BDA00022431497000001310
Second, the detection equation
Figure BDA00022431497000001311
Whether or not this is true. If the equation is true, the legal certificate is accepted, otherwise refused and reapplied.
Optionally, according to the foregoing embodiments, the method for verifying whether the certificate acceptance is valid by using the subordinate certification authority, and sending the certificate acceptance and the verification information generated by the acceptance to the user side includes:
generating certificate acceptance and verification information (psi, pi) by using a acceptance algorithm TECCom according to a master public key gmpk of the master certification authority, a public key gpk of the slave certification authority and a certificate Cert by using the slave certification authority, and sending the certificate acceptance and verification information (psi, pi) to a user side;
verifying whether the certificate acceptance psi is valid or not by using a user side through a verification algorithm TEVer according to a main public key gmpk, a certificate Cert, a certificate acceptance and verification information psi and pi of a main certification authority;
if the output of the verification algorithm TEVer is Valid, it is determined that the certificate acceptance ψ is Valid and the certificate acceptance and verification information (ψ, π) is accepted, and if the output of the verification algorithm TEVer is Invalid, it is determined that the certificate acceptance ψ is Invalid and the certificate acceptance and verification information (ψ, π) is rejected.
It is understood that the commitment algorithm TECom is expressed as, among other things, in the message M e {0, 1}nThe random number r belongs to Z*And a random number rho epsilon {0, 1}nAnd the public key pk1,pk2For input, the following calculations are performed:
Figure BDA0002243149700000141
Figure BDA0002243149700000142
the algorithm outputs a commitment psi ═ C1,C2,C3,C4,C5) The verification information is pi ═ r (r, ρ).
The verification algorithm TEVer is expressed by a message M and a public key pk1,pk2And acceptance and verification information (ψ, π') as input, and the following calculation is performed:
Figure BDA0002243149700000143
Figure BDA0002243149700000144
let psi ═ C1′,C2′,C3′,C4′,C5') and verifies if ψ is true. If so, the output is valid, otherwise the output is invalid.
Specifically, the embodiment of the present invention first obtains the certificate acceptance and verification information by utilizing the acceptance of the certificate from the certification authority. In the certificate acceptance process, a random number r ∈ Z is selected from the certification authority i*And a random number rho epsilon {0, 1}nLocal public key of main certification authority
Figure BDA0002243149700000146
Public key from certification authority i
Figure BDA0002243149700000147
And a certificate Certi,jCalculating C1,C2,C3,C4,C5
Figure BDA0002243149700000145
And thereby obtain certificate acceptance and verification information: psii,j=(C1,C2,C3,C4,C5),πi,j(r, ρ). The certificate acceptance and verification information (psi) is then transmitted from the certification authority i over the secure channeli,j,πi,j) Sent to the user as IDjThe user terminal of (1).
And then, the embodiment of the invention utilizes the user terminal to verify the certificate acceptance. In the acceptance verification process, the user information is IDjThe user end opens the promise to the verifier, and the verifier uses the local public key of the main certification authority
Figure BDA0002243149700000151
Slave certification authority i public key
Figure BDA0002243149700000152
Certificate acceptance and verification information (psi)i,j,π′i,j),ψi,j=(C1,C2,C3,C4,C5),π′i,jWith (r ', ρ') as input, the following is calculated:
Figure BDA0002243149700000153
Figure BDA0002243149700000154
let psi'i,j=(C1′,C2′,C3′,C4′,C5') and verify psii,j=ψ′i,jWhether or not this is true. If yes, the certifier promised by the certificate accepts the certificate, otherwise, the certificate is rejected.
Optionally, according to the foregoing embodiments, the signing the commitment of the certificate by using the slave certification authority, and broadcasting the commitment signature generated by the signature to the blockchain system, so that other slave certification authorities verify whether the commitment signature is valid, and when the commitment signature is valid, the storing the commitment signature in the blockchain system specifically includes:
generating a commitment signature sigma by using a group signature algorithm GSig according to a slave key gssk of the slave certification authority, a master public key gmpk of the master certification authority and a certificate commitment psi by using the slave certification authority, and broadcasting the commitment signature sigma into a block chain system;
verifying whether the commitment signature sigma is valid or not by using other slave certification authorities and adopting a verification algorithm Gver according to the master public key gmpk, the certificate commitment psi and the commitment signature sigma of the master certification authority;
and if the output of the verification algorithm Gver is Valid, determining that the commitment signature sigma is Valid and storing the commitment signature sigma into the blockchain system, and if the output of the verification algorithm Gver is Invalid, determining that the commitment signature sigma is Invalid and rejecting the commitment signature sigma.
Specifically, in the embodiment of the present invention, any slave certification authority is first used to sign the commitment of the certificate, so as to obtain the commitment signature. In the commitment signature process, the slave certification authority i uses its private key gskiPublic key gmpk and certificate acceptance psi of the main certification authorityi,jFor input, the following calculations are made:
first, a random number is selected
Figure BDA0002243149700000155
And calculated as follows
Figure BDA0002243149700000156
Figure BDA0002243149700000157
Secondly, a random number is selected
Figure BDA0002243149700000158
And calculate
Figure BDA0002243149700000159
The following were used:
Figure BDA00022431497000001510
thirdly, according to the certificate commitment psii,jComputing challenge values using a hash function
Figure BDA00022431497000001511
Figure BDA00022431497000001512
Then, a random number is used
Figure BDA0002243149700000161
And challenge value
Figure BDA0002243149700000162
Computing
Figure BDA0002243149700000163
Figure BDA0002243149700000164
Finally, the commitment signature σ is outputi,jWherein
Figure BDA0002243149700000165
The commitment signature pair (psi) is signed from the certification authority ii,j,σi,j) Submitted to the blockchain system for storage.
Thereafter, embodiments of the present invention utilize other slave certification authorities in the blockchain system to verify the commitment signature. During signature verification, miners (i.e., other slave certification authorities) in the blockchain system use the public key gmpk and commitment signature pair (ψ) of the master certification authorityi,j,σi,j) For input, the commitment signature is verified as follows:
first, parameters are calculated respectively in the following calculation manner
Figure BDA0002243149700000166
Figure BDA0002243149700000167
Figure BDA0002243149700000168
Second, the detection equation
Figure BDA0002243149700000169
Whether or not this is true. Miners in the blockchain system (i.e., others from the certification authority) accept the signature of the commitment and store it in the blockchain system if the equation is true, and refuse and delete it otherwise.
Optionally, according to the foregoing embodiments, the step of sending the certificate, the certificate acceptance and the verification information to the verifier by using the user side to verify whether the certificate acceptance is valid or not by the verifier, and when the certificate acceptance is valid, receiving the identity information of the user corresponding to the user side specifically includes:
sending the certificate Cert and the certificate acceptance and verification information (psi, pi) to a verifier by using the user side;
verifying whether the certificate acceptance psi is valid or not by using a verifying party according to a main public key gmpk, a certificate Cert and certificate acceptance and verification information psi, pi of a main certification authority by adopting a verification algorithm TEVer;
and if the output of the verification algorithm TEVer is Valid, determining that the certificate acceptance psi is Valid and accepting the identity information of the user corresponding to the user side, and if the output of the verification algorithm TEVer is Invalid, determining that the certificate acceptance psi is Invalid and rejecting the identity information of the user corresponding to the user side.
Specifically, the embodiment of the present invention implements authentication of the user identity by verifying the certificate commitment provided by the user side by using the verifier. In the identity authentication process, the user IDjOpening a commitment to the verifier, and then the verifier uses the local public key of the main certification authority
Figure BDA00022431497000001610
Slave certification authority i public key
Figure BDA00022431497000001611
And certificate acceptance and verification information (psi)i,j,π′i,j),ψi,j=(C1,C2,C3,C4,C5),π′i,jWith (r ', ρ') as input, the following is calculated:
Figure BDA0002243149700000171
Figure BDA0002243149700000172
let psi'i,j=(C1′,C2′,C3′,C4′,C5') and verify psii,j=ψ′i,jAnd if so, determining whether the current time is up or down. The verifier verifying the commitment accepts the certificate, otherwise the certificate is rejected.
Optionally, according to the foregoing embodiments, the step of tracking, by using the master authentication mechanism, the identity information of the slave authentication mechanism specifically includes: and tracking the slave key gsk of the slave certification authority by using a tracking algorithm Trace according to the master key gmsk and the commitment signature sigma of the master certification authority by using the master certification authority, and identifying the identity information of the slave certification authority based on the slave key gsk.
Specifically, embodiments of the present invention utilize the master certificate authority to track the identity information of the slave certificate authority through the tracking of the slave certificate authority signatures. In the commitment signature tracking process, the master certification authority becomes (ξ) with the master key gmsk1,ξ2) And commitment signature σi,jFor input, a slave key of the slave certification authority, i.e. a private key:
Figure BDA0002243149700000173
thus, the master certificate authority possesses partial private keys { A } of all slave certificate authorities1,...,AnCan be according to AiAnd recovering the corresponding identity of the slave certification authority.
Wherein for traceabilityTrace, given a group public key gmpk ═ g1,g2H, u, v, ω), group administrator's private key gmsk ═ ξ1,ξ2) Signature, system and method
Figure BDA0002243149700000174
And a message M. First a verification algorithm is used to verify whether the signature is valid. If not, rejecting, otherwise, calculating as follows:
Figure BDA0002243149700000175
if the group administrator has partial private key of the group member A1,...,AnThe group administrator can recover the identity A of the group member through the group signaturei
Optionally, according to the foregoing embodiments, the step of extracting a certificate from a certificate acceptance to implement cross-domain authentication by using a master certification authority and a slave certification authority respectively includes: extracting a certificate Cert by using a main certification authority and adopting an extraction algorithm Extract according to a main key gmsk of the main certification authority and a certificate acceptance psi; the certificate Cert is extracted by the slave certification authority using an extraction algorithm Extract according to the slave key gsk and the certificate acceptance ψ of the slave certification authority.
Specifically, the embodiments of the present invention utilize a master certification authority and a slave certification authority to extract certificates in cross-domain authentication. In the process of promise extraction, the main certification authority uses a local main key xi1And certificate acceptance psii,j=(C1,C2,C3,C4,C5) For input, calculate
Figure BDA0002243149700000176
And on the basis of the above-mentioned detection equation
Figure BDA0002243149700000181
Whether or not this is true. If the equation is true, the user public key certificate Cert is outputi,jOtherwise, rejecting.
The certification authority i can extract the public key certificate of the user from the certificate acceptance and can authenticate the userCertificate authority i with local private key xiThe main certification authority and the local public key
Figure BDA0002243149700000182
And certificate commitment as input, calculating
Figure BDA0002243149700000183
On the basis of the above equation, the equation is detected
Figure BDA0002243149700000184
Whether or not this is true. If the equation is true, the public key certificate Cert of the user is outputi,jOtherwise, rejecting.
To further illustrate the technical solutions of the embodiments of the present invention, the embodiments of the present invention provide the following specific processing flows according to the above embodiments, but do not limit the scope of the embodiments of the present invention.
As shown in fig. 3, a schematic flow chart of a block chain-based cross-domain authentication method according to another embodiment of the present invention is provided, where the method includes the following processing flows:
first, initialization of data is performed.
In the initialization process, the main authentication mechanism takes a safety parameter lambda as input and outputs a system public parameter Param: param ← SysGen (1)λ)。
In the key generation process, the master certification authority takes a public parameter Param as input and outputs a master key and a public key (gmpk, gmsk): (gmpk, gmsk) ← KGen (param).
The master certification authority takes the system public parameter Param and the master key gmsk as input and outputs a slave key gsk of the slave certification authorityi:gskiAnd (c) either ≦ i ≦ n ≦ 1 ≦ KGen (Param, gmsk), and transmitting the slave key to the slave certification authority over the secure channel.
Each slave certification authority shares a system public parameter Param and a slave key gskiFor input, the corresponding slave public key gpk is outputi:gpki←KGen(Param,gski),1≤i≤n。
Next, certificate generation and verification are performed.
In the certificate generation process, the slave certification authority i uses its slave key gskiA master public key gmpk of a master certification authority and identity information ID provided by a userjExporting user public key certificates for import
Figure BDA0002243149700000185
And sends to the user IDjThe user terminal of (1).
User IDjThe user side uses the master public key gmpk and the user ID of the master certification authorityjIdentity information and certificate ofi,jInputting, outputting validity judgment: Valid/Invalid ← Gsergmpk(IDj,Certi,j)。
If the formula output is valid, the user side accepts the legal certificate, otherwise, the user side refuses and reappears.
And thirdly, certificate acceptance and verification are carried out.
In the certificate acceptance process, the slave certification authority i uses the master public key gmpk of the master certification authority and the public key gpk of the slave certification authority iiAnd certificate Certi,jExporting certificate acceptance and verification information for import
Figure BDA0002243149700000191
Thereafter, certificate acceptance and verification information (ψ) is transmitted from the certification authority i through a secure channeli,j,πi,j) Send to the user IDjThe user terminal of (1).
During commitment validation, user IDjThe user end opens a promise to the verifier, and the verifier uses a master public key gmpk of a master certification authority and a public key gpk of a slave certification authorityiAnd certificate acceptance and verification information (psi)i,j,πi,j) Inputting, outputting validity judgment:
Figure BDA0002243149700000192
if the validity judgment formula is valid, the verifier verifying the acceptance of the certificate, otherwise, the certificate is rejected.
Then, the commitment signature and verification are carried out.
In the commitment signature process, the slave certification authority i uses the slave key gskiA public key gmpk of the main certification authority and a certificate acceptance psii,jOutputting commitment signatures for input
Figure BDA0002243149700000193
And sign the commitment pair (psi)i,j,σi,j) Submitted to the blockchain system for storage.
During signature verification, miners (i.e., other slave certification authorities) in the blockchain system use the public key gmpk and commitment signature pair (ψ) of the master certification authorityi,j,σi,j) Outputting validity judgment of the commitment signature for input: Valid/Invalid ← Gsergmpki,j,σi,j). Miners (i.e., other secondary certification authorities) in the blockchain system accept the signature of the commitment and store it in the blockchain system if the validity judgment formula output is valid, otherwise refuse and delete it.
Then, identity authentication is performed.
In the process of authentication of the admission, the user IDjThe user end opens a promise to the verifier, and the verifier uses the master public key gmpk of the master certification authority and the public key gpk of the slave certification authority iiCertificate acceptance and verification information (psi)i,j,πi,j) For input, judging validity:
Figure BDA0002243149700000194
if the validity judgment formula output is valid, the verifier verifying the acceptance of the certificate is accepted, otherwise the certificate is rejected.
Then, signature tracing is performed.
In the signature tracing process, the master certification authority signs sigma with the master key gmsk and the commitmenti,jFor input, the slave key gsk of the slave certification authority is outputi:gski←Tracegmski,j)。
Finally, certificate extraction is performed.
In the certificate extraction process, the masterThe certification authority takes the master key gmsk and commitment as input and outputs the user public key certificate Certi,j:Certi,j←Extractgmski,j)。
Furthermore, the slave certification authority i can also extract the user public key certificate from the certificate acceptance, and the slave certification authority i uses the slave key gsk thereofiAnd a commitment psii,jExporting user public key certificates for import
Figure BDA0002243149700000201
It is to be understood that the basic cryptographic tool used in the embodiment of the present invention includes a group signature and an extractable commitment algorithm with two extractors, and as shown in fig. 4, is a schematic diagram of the basic cryptographic tool in the block chain based cross-domain authentication method provided in the embodiment of the present invention, which includes a group signature and an extractable commitment algorithm with two extractors. For an extractable commitment algorithm with dual extractors, the following is introduced:
for the system parameter generation algorithm SysGen, a BDH parameter generator is used
Figure BDA0002243149700000207
Generating a group G1,g1Is a group G1The random generator of (1). e is (G)1,G1) Symmetric bilinear mapping, H1,H2,H3Three hash functions: h1:G1→{0,1}n,H2:{0,1}n→{0,1}n
Figure BDA0002243149700000202
For the key generation algorithm KGen, a random integer x ∈ Z is selected*Calculating
Figure BDA0002243149700000203
The public key and the private key are respectively: pk1=X,sk1X. Selecting another random integer y ∈ Z*Calculating
Figure BDA0002243149700000204
Then the other pair of public key and private key is: pk2=Y,sk2=y。
For the commitment algorithm TECom, with message M e {0, 1}nThe random number r belongs to Z*And a random number rho epsilon {0, 1}nAnd the public key pk1,pk2To input, calculate:
Figure BDA0002243149700000205
the output commitment is psi ═ (C)1,C2,C3,C4,C5) The verification information is pi ═ r (r, ρ).
For the verification algorithm TEVer, the message M and the public key pk are used1,pk2And acceptance and verification information (ψ, π') as inputs, calculating:
Figure BDA0002243149700000206
let psi ═ C1′,C2′,C3′,C4′,C5'). If ψ' the output is valid, otherwise it is rejected.
For the extraction algorithm Extract, the commitment ψ (C) is used1,C2,C3,C4,C5) And the commitment key sk1X is input, calculate:
Figure BDA0002243149700000211
then detecting equation C5=H3(ρ,M,C3,C4,e(C1,C2)x) If the message M is not accepted, outputting the message M, otherwise rejecting the message M.
Using certificate to commit psi ═ C1,C2,C3,C4,C5) And the commitment key sk2As input, calculate:
Figure BDA0002243149700000212
thereafter, equation C is detected5=H3(ρ,M,C3,C4,e(C1,C2)y) If the message M is not accepted, outputting the message M, otherwise rejecting the message M.
Based on the same inventive concept, embodiments of the present invention provide a block chain based cross-domain authentication system according to the above embodiments, where the system is used to implement block chain based cross-domain authentication in the above embodiments. Therefore, the description and definition in the block chain-based cross-domain authentication method in the embodiments above may be used for understanding each execution module in the embodiments of the present invention, and specific reference may be made to the embodiments above, which are not described herein again.
As shown in fig. 1, the block chain-based cross-domain authentication system according to the embodiment of the present invention includes 3 types of entities: a master certification authority, a slave certification authority, a user side and a verifier (wherein the verifier is also a user). The master key and the master public key of the master certification authority are (gmsk, gmpk), and the private key and the public key of the slave certification authority are (gsk, gpk). In FIG. 1 (psi)1,π1,point1) And (psi)1,π1,point1) Represents certificate commitment, authentication information and a pointer, H () represents a hash function, Pre: h () represents the hash function value calculated for the last block, and Cerfiticate represents the Merkle root of the transaction order, i.e., the hash function is calculated for a plurality of transaction orders, and a final hash function value is calculated.
The block chain-based cross-domain authentication system provided by the embodiment of the invention is formed by setting corresponding entities, and utilizes the slave authentication mechanism to realize certificate issuance, certificate acceptance and acceptance signature in the cross-domain authentication process, so that cross-domain authentication is independent of the master authentication mechanism, and a user only needs to verify the certificate issued by the slave authentication mechanism, the acceptance of the certificate and the acceptance signature, so that a verifier can quickly verify the identity information of the user, and the processing efficiency of the cross-domain authentication can be effectively improved. Meanwhile, by broadcasting the commitment signature to the block chain system, strict supervision of a slave certification authority can be realized, and the safety and the fairness of the certification process are guaranteed.
It is understood that, in the embodiment of the present invention, the entity components in the system of the foregoing embodiments may be implemented by a hardware processor (hardware processor). Moreover, the block chain based cross-domain authentication system according to the embodiment of the present invention is composed of the entities, and can implement the block chain based cross-domain authentication process according to the above-mentioned method embodiments, and when the system according to the embodiment of the present invention is used for implementing the block chain based cross-domain authentication according to the above-mentioned method embodiments, the beneficial effects produced by the system according to the embodiment of the present invention are the same as those of the corresponding above-mentioned method embodiments, and the above-mentioned method embodiments may be referred to, and details are not repeated here.
As a further aspect of the embodiments of the present invention, the present embodiment provides an electronic device according to the above embodiments, where the electronic device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps of the block chain-based cross-domain authentication method according to the above embodiments are implemented.
Further, the electronic device of the embodiment of the present invention may further include a communication interface and a bus. Referring to fig. 5, an entity structure diagram of an electronic device provided in an embodiment of the present invention includes: at least one memory 501, at least one processor 502, a communication interface 503, and a bus 504.
The memory 501, the processor 502 and the communication interface 503 complete mutual communication through the bus 504, and the communication interface 503 is used for information transmission between the electronic device and the cross-domain authentication system; the memory 501 stores a computer program that can be executed on the processor 502, and when the processor 502 executes the computer program, the steps of the block chain-based cross-domain authentication method according to the embodiments described above are implemented.
It is understood that the electronic device at least includes a memory 501, a processor 502, a communication interface 503 and a bus 504, and the memory 501, the processor 502 and the communication interface 503 are connected in communication with each other through the bus 504, and can complete communication with each other, for example, the processor 502 reads program instructions of a block chain-based cross-domain authentication method from the memory 501. In addition, the communication interface 503 may also implement communication connection between the electronic device and the cross-domain authentication system, and may complete mutual information transmission, such as implementing sending of a control instruction through the communication interface 503.
When the electronic device is running, the processor 502 calls the program instructions in the memory 501 to perform the methods provided by the above-described method embodiments, including for example: selecting safety parameters to sequentially generate public parameters, a master public key and a master secret key of the master certification authority by using the master certification authority, generating a slave secret key of the slave certification authority based on the master secret key, and distributing the slave secret key to the slave certification authority; generating a slave public key of the slave certification authority according to the slave secret key by using the slave certification authority, generating a certificate based on the slave public key, signing the certificate to the user side so that the user side can verify whether the certificate is valid or not, and receiving the certificate when the certificate is valid; the subordinate certification authority is used for committing the certificate, and the certificate commitment and verification information generated by the commitment are sent to the user side so that the user side can verify whether the certificate commitment is valid or not, and when the certificate commitment and the verification information are verified to be valid, the certificate commitment and the verification information are received; signing the commitment of the certificate by using the slave certification authority, broadcasting the commitment signature generated by the signature into the blockchain system so as to enable other slave certification authorities to verify whether the commitment signature is valid or not, and storing the commitment signature into the blockchain system when the commitment signature is valid; the method comprises the steps that a user side is utilized to send a certificate, certificate commitment and verification information to a verifier, so that the verifier can verify whether the certificate commitment is valid or not, and receives identity information of a user corresponding to the user side when the certificate commitment is valid; and tracking the identity information of the slave certification authority by using the master certification authority, and extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to realize cross-domain certification and the like.
The program instructions in the memory 501 may be implemented in the form of software functional units and may be stored in a computer readable storage medium when sold or used as a stand-alone product. Alternatively, all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, where the program may be stored in a computer-readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Embodiments of the present invention further provide a non-transitory computer-readable storage medium according to the above embodiments, on which computer instructions are stored, and when the computer instructions are executed by a computer, the steps of the block chain-based cross-domain authentication method according to the above embodiments are implemented, for example, including: selecting safety parameters to sequentially generate public parameters, a master public key and a master secret key of the master certification authority by using the master certification authority, generating a slave secret key of the slave certification authority based on the master secret key, and distributing the slave secret key to the slave certification authority; generating a slave public key of the slave certification authority according to the slave secret key by using the slave certification authority, generating a certificate based on the slave public key, signing the certificate to the user side so that the user side can verify whether the certificate is valid or not, and receiving the certificate when the certificate is valid; the subordinate certification authority is used for committing the certificate, and the certificate commitment and verification information generated by the commitment are sent to the user side so that the user side can verify whether the certificate commitment is valid or not, and when the certificate commitment and the verification information are verified to be valid, the certificate commitment and the verification information are received; signing the commitment of the certificate by using the slave certification authority, broadcasting the commitment signature generated by the signature into the blockchain system so as to enable other slave certification authorities to verify whether the commitment signature is valid or not, and storing the commitment signature into the blockchain system when the commitment signature is valid; the method comprises the steps that a user side is utilized to send a certificate, certificate commitment and verification information to a verifier, so that the verifier can verify whether the certificate commitment is valid or not, and receives identity information of a user corresponding to the user side when the certificate commitment is valid; and tracking the identity information of the slave certification authority by using the master certification authority, and extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to realize cross-domain certification and the like.
In the electronic device and the non-transitory computer readable storage medium provided in the embodiments of the present invention, by performing the steps of the block chain based cross-domain authentication method described in each of the embodiments, the certificate issuance, the certificate acceptance and the acceptance signature in the cross-domain authentication process are implemented by the slave certificate authority, so that the cross-domain authentication is not dependent on the master certificate authority, and the user only needs to verify the certificate issued by the slave certificate authority, the acceptance of the certificate, and the signature of the acceptance, so that the verifier can quickly verify the identity information of the user, thereby effectively improving the processing efficiency of the cross-domain authentication. Meanwhile, by broadcasting the commitment signature to the block chain system, strict supervision of a slave certification authority can be realized, and the safety and the fairness of the certification process are guaranteed.
It is to be understood that the above-described embodiments of the apparatus, the electronic device and the storage medium are merely illustrative, and that elements described as separate components may or may not be physically separate, may be located in one place, or may be distributed on different network elements. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the technical solutions mentioned above may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a usb disk, a removable hard disk, a ROM, a RAM, a magnetic or optical disk, etc., and includes several instructions for causing a computer device (such as a personal computer, a server, or a network device, etc.) to execute the methods described in the method embodiments or some parts of the method embodiments.
In addition, it should be understood by those skilled in the art that in the specification of the embodiments of the present invention, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. The term "comprising", without further limitation, means that the element so defined is not excluded from the group consisting of additional identical elements in the process, method, article, or apparatus that comprises the element.
In the description of the embodiments of the invention, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description. Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects.
However, the disclosed method should not be interpreted as reflecting an intention that: that is, the claimed embodiments of the invention require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of an embodiment of this invention.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the embodiments of the present invention, and not to limit the same; although embodiments of the present invention have been described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A block chain-based cross-domain authentication method is characterized in that the block chain-based cross-domain authentication method is implemented based on a given cross-domain authentication system, the given cross-domain authentication system comprises a master authentication mechanism, a slave authentication mechanism, a user side and a verifier, and the block chain-based cross-domain authentication method comprises the following steps:
step 1, selecting safety parameters to sequentially generate public parameters and a master public key and a master secret key of a master certification authority by using the master certification authority, generating a slave secret key of the slave certification authority based on the master secret key, and distributing the slave secret key to the slave certification authority;
step 2, generating a slave public key of the slave certification authority according to the slave secret key by using the slave certification authority, generating a certificate based on the slave public key, signing to the user side so that the user side can verify whether the certificate is valid, and receiving the certificate when the certificate is valid;
step 3, utilizing the slave certification authority to commit the certificate, and sending the certificate commitment and verification information generated by the commitment to the user side so that the user side can verify whether the certificate commitment is valid, and receiving the certificate commitment and the verification information when the certificate commitment and the verification information are valid;
step 4, utilizing the slave certification authority to sign the certificate commitment, broadcasting a commitment signature generated by the signature to the blockchain system so that other slave certification authorities can verify whether the commitment signature is valid, and storing the commitment signature in the blockchain system when the commitment signature is valid;
step 5, the user side is utilized to send the certificate, the certificate acceptance and the verification information to the verifier, so that the verifier can verify whether the certificate acceptance is valid or not, and when the verification is valid, the identity information of the user corresponding to the user side is received;
step 6, tracking the identity information of the slave certification authority by using the master certification authority, and extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to realize cross-domain certification;
wherein the content of the first and second substances,
the specific operation of step 3 is: generating certificate acceptance and verification information (psi, pi) by using the slave certification authority according to the master public key gmpk of the master certification authority, the public key gpk of the slave certification authority and the certificate Cert by using an acceptance algorithm TECom, and sending the certificate acceptance and verification information (psi, pi) to the user side; verifying whether the certificate acceptance psi is valid or not by adopting a verification algorithm TEVer according to the master public key gmpk of the master certification authority, the certificate Cert, the certificate acceptance and the verification information psi, pi;
the specific operation of step 4 is to generate a commitment signature sigma by using the slave certification authority and according to a slave key gssk of the slave certification authority, a master public key gmpk of the master certification authority and a certificate commitment psi by using a group signature algorithm GSig, and broadcast the commitment signature sigma to a block chain system; and verifying whether the commitment signature sigma is valid or not by using the other slave certification authorities and adopting a verification algorithm Gver according to the master public key gmpk, the certificate commitment psi and the commitment signature sigma of the master certification authority.
2. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of selecting a security parameter to generate a public parameter and a master public key and a master secret key of the master certificate authority by using the master certificate authority, and generating a slave secret key of the slave certificate authority based on the master secret key, and distributing the slave secret key to the slave certificate authority specifically comprises:
and the main authentication mechanism is utilized to complete the following processing flows in sequence:
selecting a safety parameter 1λAnd based on the safety parameter 1λGenerating a public parameter Param by adopting a system parameter generation algorithm SysGen;
generating a master public key gmpk and a master key gmsk of the master certification authority by adopting a key generation algorithm KGen based on a public parameter Param, and generating a slave key gsk of the slave certification authority by adopting a key generation algorithm KGen based on the master key gmsk;
the step of generating, by the slave certificate authority, a slave public key of the slave certificate authority from the slave key specifically includes: and generating a slave public key gpk of the slave certification authority by using a key generation algorithm KGen based on a slave key gsk of the slave certification authority by using the slave certification authority.
3. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of generating a certificate based on the slave public key and issuing the certificate to the user end for the user end to verify whether the certificate is valid, and accepting the certificate when the certificate is valid specifically includes:
utilizing the slave certification authority, based on the slave key gsk of the slave certification authority, the master public key gmpk of the master certification authority and the identity information ID of the user corresponding to the user endjAdopting a group signature algorithm GSig to generate a certificate Cert to sign and send the certificate Cert to the user side;
utilizing the user side according to the master public key gmpk and the identity information ID of the userjAnd a certificate Cert, which adopts a verification algorithm Gser to verify whether the certificate Cert is valid;
and if the output of the verification algorithm Gver is Valid, determining that the certificate Cert is Valid and accepting the certificate Cert, and if the output of the verification algorithm Gver is Invalid, determining that the certificate Cert is Invalid and rejecting the certificate Cert.
4. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of committing the certificate by the slave authentication authority and sending a certificate commitment and verification information generated by the commitment to the user terminal so that the user terminal can verify whether the certificate commitment is valid, and when the certificate commitment and the verification information are valid, accepting the certificate commitment and the verification information further comprises:
if the output of the verification algorithm TEVer is Valid, it is determined that the certificate acceptance ψ is Valid and the certificate acceptance and verification information (ψ, π) is accepted, and if the output of the verification algorithm TEVer is Invalid, it is determined that the certificate acceptance ψ is Invalid and the certificate acceptance and verification information (ψ, π) is rejected.
5. The blockchain-based cross-domain authentication method according to claim 1, wherein the signing the certificate commitment with the slave certification authority and broadcasting the commitment signature generated by the signing into the blockchain system for other slave certification authorities to verify whether the commitment signature is valid, and when the commitment signature is valid, storing the commitment signature into the blockchain system further comprises:
and if the output of the verification algorithm Gver is Valid, determining that the commitment signature sigma is Valid and storing the commitment signature sigma into the blockchain system, and if the output of the verification algorithm Gver is Invalid, determining that the commitment signature sigma is Invalid and rejecting the commitment signature sigma.
6. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of sending the certificate, the certificate acceptance and the verification information to the verifier by using the user side for the verifier to verify whether the certificate acceptance is valid, and when the certificate acceptance is valid, accepting identity information of a user corresponding to the user side specifically comprises:
sending a certificate Cert and certificate acceptance and verification information (ψ, π) to the verifier by using the user side;
verifying whether the certificate acceptance psi is valid or not by using the verifier according to the master public key gmpk of the master certification authority, the certificate Cert and the certificate acceptance and verification information psi, pi by adopting a verification algorithm TEVer;
and if the output of the verification algorithm TEVer is Valid, determining that the certificate acceptance psi is Valid and accepting the identity information of the user corresponding to the user side, and if the output of the verification algorithm TEVer is Invalid, determining that the certificate acceptance psi is Invalid and rejecting the identity information of the user corresponding to the user side.
7. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of tracking, by the master authentication mechanism, the identity information of the slave authentication mechanism specifically comprises:
and tracking a slave key gsk of the slave certification authority by using the master certification authority according to a master key gmsk and a commitment signature sigma of the master certification authority by adopting a tracking algorithm Trace, and identifying the identity information of the slave certification authority based on the slave key gsk.
8. The blockchain-based cross-domain authentication method according to claim 1, wherein the step of extracting the certificate from the certificate commitment by using the master certification authority and the slave certification authority respectively to implement cross-domain authentication specifically comprises:
extracting a certificate Cert by using the main certification authority and adopting an extraction algorithm Extract according to a main key gmsk of the main certification authority and a certificate commitment psi;
and extracting the certificate Cert by using the slave certification authority by adopting an extraction algorithm Extract according to the slave key gsk of the slave certification authority and the certificate acceptance psi.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the block chain based cross-domain authentication method according to any one of claims 1 to 8 when executing the computer program.
10. A non-transitory computer readable storage medium having stored thereon computer instructions, wherein the computer instructions, when executed by a computer, implement the steps of the blockchain based cross-domain authentication method according to any one of claims 1 to 8.
CN201911007278.0A 2019-10-22 2019-10-22 Cross-domain authentication method based on block chain and electronic equipment Active CN110661816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911007278.0A CN110661816B (en) 2019-10-22 2019-10-22 Cross-domain authentication method based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911007278.0A CN110661816B (en) 2019-10-22 2019-10-22 Cross-domain authentication method based on block chain and electronic equipment

Publications (2)

Publication Number Publication Date
CN110661816A CN110661816A (en) 2020-01-07
CN110661816B true CN110661816B (en) 2021-11-05

Family

ID=69041525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911007278.0A Active CN110661816B (en) 2019-10-22 2019-10-22 Cross-domain authentication method based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN110661816B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408003B (en) * 2020-03-16 2022-11-04 上海唯链信息科技有限公司 Block chain cross-chain method and device
CN112311772B (en) * 2020-10-12 2022-06-14 华中师范大学 Hyperridge-based cross-domain certificate management system and method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545243A (en) * 2003-11-24 2004-11-10 华中科技大学 Method and system for certification
CN101453476A (en) * 2009-01-06 2009-06-10 中国人民解放军信息工程大学 Cross domain authentication method and system
CN101471777A (en) * 2007-12-29 2009-07-01 中国科学院计算技术研究所 Access control system and method between domains based on domain name
CN102055769A (en) * 2010-12-29 2011-05-11 北京理工大学 Multi- trust domain authentication system under lattice-based grid environment
CN104901804A (en) * 2014-08-28 2015-09-09 赵捷 User autonomy-based identity authentication implementation method
CN108737370A (en) * 2018-04-05 2018-11-02 西安电子科技大学 A kind of cross-domain Verification System of Internet of Things based on block chain and method
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN109743172A (en) * 2018-12-06 2019-05-10 国网山东省电力公司电力科学研究院 Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal
CN109829326A (en) * 2018-11-20 2019-05-31 西安电子科技大学 Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170187726A1 (en) * 2015-12-24 2017-06-29 Zeta (Better World Technology Pvt. Ltd.) Cross-domain message authentication

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545243A (en) * 2003-11-24 2004-11-10 华中科技大学 Method and system for certification
CN101471777A (en) * 2007-12-29 2009-07-01 中国科学院计算技术研究所 Access control system and method between domains based on domain name
CN101453476A (en) * 2009-01-06 2009-06-10 中国人民解放军信息工程大学 Cross domain authentication method and system
CN102055769A (en) * 2010-12-29 2011-05-11 北京理工大学 Multi- trust domain authentication system under lattice-based grid environment
CN104901804A (en) * 2014-08-28 2015-09-09 赵捷 User autonomy-based identity authentication implementation method
CN108737370A (en) * 2018-04-05 2018-11-02 西安电子科技大学 A kind of cross-domain Verification System of Internet of Things based on block chain and method
CN109194610A (en) * 2018-07-24 2019-01-11 北京交通大学 Vehicle-mounted mist data lightweight anonymous access authentication method based on block chain auxiliary
CN109829326A (en) * 2018-11-20 2019-05-31 西安电子科技大学 Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
CN109743172A (en) * 2018-12-06 2019-05-10 国网山东省电力公司电力科学研究院 Based on alliance's block chain V2G network cross-domain authentication method, information data processing terminal
CN110061851A (en) * 2019-04-28 2019-07-26 广州大学 A kind of across trust domain authentication method and system of decentralization

Also Published As

Publication number Publication date
CN110661816A (en) 2020-01-07

Similar Documents

Publication Publication Date Title
CN111639361B (en) Block chain key management method, multi-person common signature method and electronic device
Suma Security and privacy mechanism using blockchain
US7958362B2 (en) User authentication based on asymmetric cryptography utilizing RSA with personalized secret
CN110069918B (en) Efficient double-factor cross-domain authentication method based on block chain technology
CN106341232B (en) A kind of anonymous entity discrimination method based on password
CN107612934A (en) A kind of block chain mobile terminal computing system and method based on Secret splitting
CN113301022B (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
CN101951388A (en) Remote attestation method in credible computing environment
CN114036539A (en) Safety auditable Internet of things data sharing system and method based on block chain
CN112839041B (en) Block chain-based power grid identity authentication method, device, medium and equipment
CN113743939A (en) Identity authentication method, device and system based on block chain
CN112417489B (en) Digital signature generation method and device and server
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN110661816B (en) Cross-domain authentication method based on block chain and electronic equipment
CN116566626A (en) Ring signature method and apparatus
Shankar et al. Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward‐Curve Digital Signature Algorithm
CN113055161B (en) Mobile terminal authentication method and system based on SM2 and SM9 digital signature algorithms
CN112364335B (en) Identification identity authentication method and device, electronic equipment and storage medium
CN110572392A (en) Identity authentication method based on HyperLegger network
CN111245611B (en) Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
CN117195306A (en) Malicious participation behavior detection method based on multiparty energy data privacy calculation
CN110740034B (en) Method and system for generating QKD network authentication key based on alliance chain
CN114268437A (en) Data processing method, block chain node, system and computer readable storage medium
CN113507366B (en) Grid-based searchable log blind signature scheme
Gong et al. A threshold group signature scheme suitable for the Internet of Things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant