Abstract
To overcome the difficulties in the traditional password-based identity authentication procedure with high security risk and complexity, and to avoid the privacy leaking problems arising from a series of new techniques such as using biometrics as key, this paper proposes a universal solution for decentralized identity authentication by block chain integrated with a trusted execution environment, through a separate hardware to establish a secure area, enabling identity anonymity and avoiding feature disclosure. Smart contract and consensus mechanism are adopted for building trusted identity nodes between decentralized nodes by constructing a traceable identity data structure in blockchain. We conduct formal theoretical and empirical evaluations to show that the proposed can realize user identity registration, cross-platform authentication, and guarantee security in the whole procedure with efficiency and reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nasir, A., Arshah, R.A.: Information security culture dimensions in information security policy compliance study: a review. Adv. Sci. Lett. 24(2), 943–946 (2018)
Lind, J., Eyal, I., Kelbert, F., et al.: Teechain: scalable blockchain payments using trusted execution environments (2017). arXiv preprint arXiv:1707.05454
Ren-Ji, H., Xiao-Ping, W.U., Hong-Cheng, L.I.: Identity authentication scheme based on identity-based encryption. Chin. J. Netw. Inf. Secur. 2(6), 32–37 (2016)
Zhang, L., Ning, H.Y., Du, Y.Y., et al.: A new identity authentication scheme of single sign on for multi-database. In: IEEE International Conference on Software Engineering and Service Science. IEEE (2017)
Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77–89 (2014)
Yafei, T., Yunyong, Z., Ni, Z.: Cloud security certification technology based on fingerprint recognition. Telecommun. Sci. 31(8), 2015211 (2015)
Jin, Z.: Research on remote identity authentication model based on trusted firmware. Netw. Secur. Technol. Appl. 2018(09), 30–31
Marc, P.: Blockchain Technology: Principles and Applications. Social Science Electronic Publishing (2015)
Lu, D., Ma, J., Sun, C., et al.: Building a secure scheme for a trusted hardware sharing environment. IEEE Access 5, 20260–20271 (2017)
Moyano, J.P., Ross, O.: KYC optimization using distributed ledger technology. Bus. Inf. Syst. Eng. 59(6), 411–423 (2017)
Acknowledgments
This material is based upon work supported by the NSFC fund No. 61472189, CERNET Innovation Project No. NGII20180103, and Postgraduate Research & Practice Innovation Program of Jiangsu Province No. KYCX18_0484. Opinions expressed are those of the authors and do not necessarily reflect the views of the sponsors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, J., Wei, S., Liu, H. (2019). Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone. In: Joshi, J., Nepal, S., Zhang, Q., Zhang, LJ. (eds) Blockchain – ICBC 2019. ICBC 2019. Lecture Notes in Computer Science(), vol 11521. Springer, Cham. https://doi.org/10.1007/978-3-030-23404-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-23404-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23403-4
Online ISBN: 978-3-030-23404-1
eBook Packages: Computer ScienceComputer Science (R0)