A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography

Most blockchain-based identity authentication systems focus on using blockchain to establish the public key infrastructure (PKI). It can solve the problem of single point of failure and certificate transparency faced by traditional PKI systems, but there are still some problems such as complex certificate management and complex certificate usage process. In this paper, we propose an identity authentication scheme based on blockchain and identity-based cryptography (IBC). The scheme implements a decentralized private key generator (PKG) by deploying the smart contract in Ethereum blockchain, and uses the IBC signature algorithm and challenge-response protocol during the authentication process. Compared with other blockchain-based identity authentication systems, the scheme not only prevents the single point of failure, but also avoids the complex certificate management, has lower system complexity, and resists impersonation attack, man-in-the-middle attack and replay attack.

[1]  Fabien A. P. Petitcolas,et al.  A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.

[2]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[3]  Louise Axon,et al.  Privacy-awareness in blockchain-based PKI , 2015 .

[4]  Raphael M. Reischuk,et al.  IKP: Turning a PKI Around with Decentralized Automated Incentives , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[5]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[6]  Dragos Velicanu,et al.  CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .

[7]  Choong Seon Hong,et al.  Identity-based mutual device authentication schemes for PLC system , 2008, 2008 IEEE International Symposium on Power Line Communications and Its Applications.

[8]  Jitender S. Deogun,et al.  Identity management using blockchain for cognitive cellular networks , 2017, 2017 IEEE International Conference on Communications (ICC).

[9]  Eric W. Burger,et al.  E-residency and blockchain , 2017, Comput. Law Secur. Rev..

[10]  Bing He,et al.  An identity-based authentication and key establishment scheme for multi-operator maintained Wireless Mesh Networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  Zhang Lei,et al.  Research on Certificateless Public Key Cryptography , 2011 .

[13]  Chanathip Namprempre,et al.  Security Proofs for Identity-Based Identification and Signature Schemes , 2008, Journal of Cryptology.