Effective Identity Authentication Based on Multiattribute Centers for Secure Government Data Sharing
作者机构:School of Computer ScienceQufu Normal UniversityRizhao 276800China Science and Technology Innovation Service Institution of RizhaoRizhao 276800China
出 版 物:《Tsinghua Science and Technology》 (清华大学学报(自然科学版(英文版))
年 卷 期:2024年第29卷第3期
页 面:736-752页
核心收录:
学科分类:08[工学] 0803[工学-光学工程] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:supported by the National Natural Science Foundation of China(Nos.61771289 and 61832012) the Natural Science Foundation of Shandong Province(Nos.ZR2021QF050 and ZR2021MF075) the Shandong Natural Science Foundation Major Basic Research(No.ZR2019ZD10) the Shandong Key Research and Development Program(No.2019GGX1050) the Shandong Major Agricultural Application Technology Innovation Project(No.SD2019NJ007)
主 题:blockchain identity authentication distribution dynamic key generation
摘 要:As one of the essential steps to secure government data sharing,Identity Authentication(IA)plays a vital role in the processing of large ***,the centralized IA scheme based on a trusted third party presents problems of information leakage and single point of failure,and those related to key ***,herein,an effective IA model based on multiattribute centers is ***,a private key of each attribute of a data requester is generated by the attribute authorization *** obtaining the private key of attribute,the data requester generates a personal private ***,a dynamic key generation algorithm is proposed,which combines blockchain and smart contracts to periodically update the key of a data requester to prevent theft by external attackers,ensure the traceability of IA,and reduce the risk of privacy ***,the combination of blockchain and interplanetary file systems is used to store attribute field information of the data requester to further reduce the cost of blockchain information storage and improve the effectiveness of information *** results show that the proposed model ensures the privacy and security of identity information and outperforms similar authentication models in terms of computational and communication costs.