Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (12): 3731-3740.DOI: 10.11772/j.issn.1001-9081.2023121824
• 2023 CCF China Blockchain Conference (CCF CBCC 2023) • Previous Articles Next Articles
Deyuan LIU1,2,3, Jingquan ZHANG1,2,3(), Xing ZHANG1,2,3, Wunan WAN1,2,3, Shibin ZHANG1,2,3, Zhi QIN1,2,3
Received:
2023-12-29
Revised:
2024-02-15
Accepted:
2024-02-26
Online:
2024-03-11
Published:
2024-12-10
Contact:
Jingquan ZHANG
About author:
LIU Deyuan, born in 1997, M. S. candidate. His research interests include blockchain.Supported by:
刘德渊1,2,3, 张金全1,2,3(), 张鑫1,2,3, 万武南1,2,3, 张仕斌1,2,3, 秦智1,2,3
通讯作者:
张金全
作者简介:
刘德渊(1997—),男,四川旺苍人,硕士研究生,CCF会员,主要研究方向:区块链基金资助:
CLC Number:
Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption[J]. Journal of Computer Applications, 2024, 44(12): 3731-3740.
刘德渊, 张金全, 张鑫, 万武南, 张仕斌, 秦智. 基于无证书签密的跨链身份认证方案[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3731-3740.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023121824
实体 | 描述 |
---|---|
中继链 | 有验证、转发、分配参数等功能的区块链 |
应用链 | 参与跨链交互的独立区块链 |
DCCG | 应用链选举的DCCG |
跨链用户 | 参与跨链交互的用户 |
身份中心 | 存储DID的IPFS系统 |
Tab. 1 List of cross-chain system entities
实体 | 描述 |
---|---|
中继链 | 有验证、转发、分配参数等功能的区块链 |
应用链 | 参与跨链交互的独立区块链 |
DCCG | 应用链选举的DCCG |
跨链用户 | 参与跨链交互的用户 |
身份中心 | 存储DID的IPFS系统 |
参数 | 含义 |
---|---|
@context | DID文档的版本 |
id | DID标识符 |
publicKey | 相关公钥集合 |
authentication | 用于验证该DID的公钥 |
controller | 对应公钥的所有者 |
publicKeyPem | 公钥字符串 |
type | 非对称加密算法 |
credentialSubject | 可选择披露的字段 |
description-id | 发送注册请求时发送者指定的ID |
Tab. 2 DID document parameters
参数 | 含义 |
---|---|
@context | DID文档的版本 |
id | DID标识符 |
publicKey | 相关公钥集合 |
authentication | 用于验证该DID的公钥 |
controller | 对应公钥的所有者 |
publicKeyPem | 公钥字符串 |
type | 非对称加密算法 |
credentialSubject | 可选择披露的字段 |
description-id | 发送注册请求时发送者指定的ID |
环境 | 项目 | 值 |
---|---|---|
Ethereum环境 | Ethereum版本 | Go-Ethereum(v1.12.2) |
智能合约版本 | Solidity(0.8.18) | |
节点数 | 6 | |
操作系统 | Ubuntu 64 bit(18.04 LTS) | |
节点终端配置 | CPU:8核,3.2 GHz,内存8 GB | |
Fabric环境 | Fabric | V2.0 |
智能合约语言 | Node.js | |
Peer节点数 | 4 | |
Orderer节点数 | 1 | |
操作系统 | Ubuntu(18.04 LTS) | |
节点终端配置 | CPU:8核,3.2 GHz,内存8 GB | |
跨链环境 | 中继链平台 | BitXHub(v2.8) |
IPFS版本 | v0.21.0 | |
操作系统 | Ubuntu 64 bit(18.04 LTS) | |
终端配置 | CPU:8核,3.2 GHz,内存8 GB |
Tab. 3 Experimental environment
环境 | 项目 | 值 |
---|---|---|
Ethereum环境 | Ethereum版本 | Go-Ethereum(v1.12.2) |
智能合约版本 | Solidity(0.8.18) | |
节点数 | 6 | |
操作系统 | Ubuntu 64 bit(18.04 LTS) | |
节点终端配置 | CPU:8核,3.2 GHz,内存8 GB | |
Fabric环境 | Fabric | V2.0 |
智能合约语言 | Node.js | |
Peer节点数 | 4 | |
Orderer节点数 | 1 | |
操作系统 | Ubuntu(18.04 LTS) | |
节点终端配置 | CPU:8核,3.2 GHz,内存8 GB | |
跨链环境 | 中继链平台 | BitXHub(v2.8) |
IPFS版本 | v0.21.0 | |
操作系统 | Ubuntu 64 bit(18.04 LTS) | |
终端配置 | CPU:8核,3.2 GHz,内存8 GB |
方案 | 加密/认证技术 | 去中心化程度 | 可扩展性 |
---|---|---|---|
本文方案 | CLSC-DID | 高 | 高 |
文献[ | ZKP-ECC | 低 | 中 |
文献[ | IBE-DID | 低 | 高 |
文献[ | BTCAS | 低 | 中 |
文献[ | Kerberos | 低 | 中 |
Tab. 4 Comparison of different cross-chain identity authentication schemes
方案 | 加密/认证技术 | 去中心化程度 | 可扩展性 |
---|---|---|---|
本文方案 | CLSC-DID | 高 | 高 |
文献[ | ZKP-ECC | 低 | 中 |
文献[ | IBE-DID | 低 | 高 |
文献[ | BTCAS | 低 | 中 |
文献[ | Kerberos | 低 | 中 |
1 | 邵奇峰,金澈清,张召,等. 区块链技术:架构及进展[J]. 计算机学报, 2018, 41(5):969-988. |
SHAO Q F, JIN C Q, ZHANG Z, et al. Blockchain: architecture and research progress [J]. Chinese Journal of Computers, 2018, 41(5): 969-988. | |
2 | 李凌霄,袁莎,金银玉. 基于区块链的联邦学习技术综述[J]. 计算机应用研究, 2021, 38(11):3222-3230. |
LI L X, YUAN S, JIN Y Y. Review of blockchain-based federated learning[J]. Application Research of Computers, 2021, 38(11): 3222-3230. | |
3 | 徐堃,付印金,陈卫卫,等. 基于区块链的云存储安全研究进展[J]. 计算机科学, 2021, 48(11):102-115. |
XU K, FU Y J, CHEN W W, et al. Research progress on blockchain-based cloud storage security mechanism[J]. Computer Science, 2021, 48(11): 102-115. | |
4 | 方俊杰,雷凯. 面向边缘人工智能计算的区块链技术综述[J]. 应用科学学报, 2020, 38(1):1-21. |
FANG J J, LEI K. Blockchain for edge AI computing: a survey [J]. Journal of Applied Sciences, 2020, 38(1): 1-21. | |
5 | 田志宏. 面向物联网的区块链共识机制研究[D]. 烟台:烟台大学, 2022:1-4. |
TIAN Z H. Research on blockchain consensus mechanism of internet of things[D] Yantai: Yantai University, 2022:1-4. | |
6 | 孟博,王乙丙,赵璨,等. 区块链跨链协议综述[J]. 计算机科学与探索, 2022, 16(10):2177-2192. |
MENG B, WANG Y B, ZHAO C, et al. Survey on cross-chain protocols of blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(10): 2177-2192. | |
7 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system [EB/OL]. [2023-10-26].. |
8 | BUTERIN V.A next-generation smart contract and decentralized application platform [R/OL]. [2023-10-27]. . |
9 | POON J, DRYJA T. The Bitcoin lightning network: scalable off-chain instant payments [EB/OL]. [2023-11-08].. |
10 | KWON J, BUCHMAN E. Cosmos whitepaper: a network of distributed ledgers [R/OL]. [2023-11-12].. |
11 | WOOD G. Polkadot: vision for a heterogeneous multi-chain framework [EB/OL]. [2023-09-24].. |
12 | 微众银行区块链团队. WeCross 技术白皮书:区块链跨链协作平台 [R/OL]. [2023-11-18].. |
WeBank Blockchain Team. WeCross technical whitepaper: blockchain interoperability platform [R/OL]. [2023-11-06].. | |
13 | 叶少杰,汪小益,徐才巢,等. BitXHub:基于侧链中继的异构区块链互操作平台[J]. 计算机科学, 2020, 47(6): 294-302. |
YE S J, WANG X Y, XU C C, et al. BitXHub: side-relay chain based heterogeneous blockchain interoperable platform[J]. Computer Science, 2020, 47(6): 294-302. | |
14 | 李芳,李卓然,赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6):1649-1660. |
LI F, LI Z R, ZHAO H. Research on the progress in cross-chain technology of blockchains [J]. Journal of Software, 2019, 30(6): 1649-1660. | |
15 | MICHELSON K, SRIDHARAN A, ÇABUK U C, et al. Accumulate: an identity-based blockchain protocol with cross-chain support, human-readable addresses, and key management capabilities[EB/OL] [2023-09-10].. |
16 | 白伊瑞,田宁,雷虹,等. 基于DID的跨链身份认证研究综述[J]. 计算机科学与探索, 2024, 18(3):597-611. |
BAI Y R, TIAN N, LEI H, et al. Overview of cross-chain identity authentication based on DID [J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(3):597-611. | |
17 | BAI Y, LEI H, LI S, et al. Decentralized and self-sovereign identity in the era of blockchain: a survey [C]// Proceedings of the 2022 IEEE International Conference on Blockchain. Piscataway: IEEE, 2022: 500-507. |
18 | 高一犇. 基于区块链跨链技术的链间数据共享和身份认证的研究与应用[D]. 兰州:兰州理工大学, 2023:2-6. |
GAO Y B. Research and application of inter-chain data sharing and identity authentication based on blockchain cross-chain technology[D]. Lanzhou: Lanzhou University of Technology, 2023:2-6. | |
19 | 杨淳,李经纬,李洪伟,等. 异构身份联盟统一身份标识模型研究[J]. 信息安全与通信保密, 2019(6):27-35. |
YANG C, LI J W, LI H W, et al. A research on heterogeneous identity alliance unified identity model[J]. Information Security and Communications Privacy, 2019(6): 27-35. | |
20 | ZHANG L, ZOU X, YANG M. Identity authentication chain based on encrypted database in heterogeneous alliance network[C]// Proceedings of the 7th International Conference on Information Technology: IoT and Smart City. New York: ACM, 2019: 353-356. |
21 | 王洒洒,戴炳荣,朱孟禄,等. 面向跨链系统的用户身份标识认证模型[J]. 计算机工程与应用, 2022, 58(19):135-141. |
WANG S S, DAI B R, ZHU M L, et al. User identity authentication model for cross-chain system[J]. Computer Engineering and Applications, 2022, 58(19):135-141. | |
22 | W3C. Decentralized Identifiers (DIDs) v1.0[EB/OL]. [2023-09-21].. |
23 | 谢晴晴,董凡. 轻量级区块链技术综述[J]. 软件学报, 2023, 34(1): 33-49. |
XIE Q Q, DONG F. Survey on lightweight blockchain technology[J]. Journal of Software, 2023, 34(1): 33-49. | |
24 | WRIGHT A, DE FILIPPI P. Decentralized blockchain technology and the rise of lex cryptographia [EB/OL]. [2023-03-24].. |
25 | 王姝爽,马兆丰,刘嘉微,等. 区块链跨链安全接入与身份认证方案研究与实现[J]. 信息网络安全, 2022, 22(6):61-72. |
WANG S S, MA Z F, LIU J W, et al. Research and implementation of cross-chain security access and identity authentication scheme of blockchain [J]. Netinfo Security, 2022, 22(6): 61-72. | |
26 | SHAO S, CHEN F, XIAO X, et al. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT [J]. World Wide Web, 2021, 24(5): 1665-1690. |
27 | AL-RIYAMI S S, PATERSON K G. Certificateless public key cryptography[C]// Proceedings of the 2003 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2894. Berlin: Springer, 2003: 452-473. |
28 | 金正平. 基于身份的密码体制中密钥托管问题的相关研究[D]. 北京:北京邮电大学, 2010:3-8. |
JIN Z P. Research on the key escrow problem in identity based cryptosystem [D]. Beijing: Beijing University of Posts and Telecommunications, 2010:3-8. | |
29 | 陈武阳. 基于区块链的PKI身份认证的研究[D]. 兰州:兰州理工大学, 2020:2-8. |
CHEN W Y. Research on PKI identity authentication based on blockchain[D]. Lanzhou: Lanzhou University of Technology, 2020:2-8. | |
30 | YOON D, MOON S, PARK K, et al. Blockchain-based personal data trading system using decentralized identifiers and verifiable credentials [C]// Proceedings of the 2021 International Conference on Information and Communication Technology Convergence. Piscataway: IEEE, 2021: 150-154. |
31 | ZHANG H, CHEN X, LAN X, et al. BTCAS: a blockchain-based thoroughly cross-domain authentication scheme [J]. Journal of Information Security and Applications, 2020, 55: No.102538. |
32 | LI X, ZHENG Z, CHENG P, et al. MACT: a multi-channel anonymous consensus based on Tor [J]. World Wide Web, 2023, 26(3): 1005-1029. |
33 | 李发根,廖永建. 数字签密原理与技术[M]. 北京:科学出版社, 2014:65-70. |
LI F G, LIAO Y J. Principles and techniques of digital signcryption [M]. Beijing: Science Press, 2014:65-70. | |
34 | HAN P, YAN Z, DING W, et al. A survey on cross-chain technologies [J]. Distributed Ledger Technologies: Research and Practice, 2023, 2(2): No.15. |
35 | ZAMYATIN A, AL-BASSAM M, ZINDROS D, et al. SoK: communication across distributed ledgers [C]// Proceedings of the 2021 International Conference on Financial Cryptography and Data Security, LNCS 12675. Berlin: Springer, 2021: 3-36. |
36 | ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature)+ cost (encryption)[C]// Proceedings of the 1997 Annual International Cryptology Conference, LNCS 1294. Berlin: Springer, 1997: 165-179. |
37 | 孙浩,毛瀚宇,张岩峰. 区块链跨链技术发展及应用[J]. 计算机科学, 2022, 49(5):287-295. |
SUN H, MAO H Y, ZHANG Y F. Development and application of blockchain cross-chain technology [J]. Computer Science, 2022, 49(5): 287-295. | |
38 | LIU S, MU T, XU S, et al. Research on cross-chain method based on distributed digital identity [C]// Proceedings of the 4th International Conference on Blockchain Technology. New York: ACM, 2022: 59-73. |
39 | VO H T, WANG Z, KARUNAMOORTHY D, et al. Internet of blockchains: techniques and challenges ahead [C]// Proceedings of the 2018 IEEE International Conference on Internet of Thing/ Green Computing and Communications/ Cyber, Physical and Social Computing/ Smart Data. Piscataway: IEEE, 2018: 1574-1581. |
40 | ZUO Y, YANG M, QIANG Z, et al. A review of cross-blockchain solutions[C]// Proceedings of the 2021 EAI International Conference on Cloud Computing, LNICST 430. Cham: Springer, 2022: 221-233. |
41 | SCHEID E J, HEGNAUER T, RODRIGUES B, et al. Bifröst: a modular blockchain interoperability API [C]// Proceedings of the IEEE 44th Conference on Local Computer Networks. Piscataway: IEEE, 2019: 332-339. |
42 | KIM S, KWON Y, CHO S. A survey of scalability solutions on blockchain [C]// Proceedings of the 2018 International Conference on Information and Communication Technology Convergence. Piscataway: IEEE, 2018: 1204-1207. |
43 | LYS L, MICOULET A, POTOP-BUTUCARU M. Atomic cross chain swaps via relays and adapters [C]// Proceedings of the 3rd Workshop on Cryptocurrencies and Blockchains for Distributed Systems. New York: ACM, 2020: 59-64. |
44 | WANG L, WU J, YUAN R, et al. Dynamic adaptive cross-chain trading mode for multi-microgrid joint operation[J]. Sensors, 2020, 20(21): No.6096. |
45 | KARATI A, ISLAM S K H, BISWAS G P. A pairing-free and provably secure certificateless signature scheme[J]. Information Sciences, 2018, 450: 378-391. |
46 | ISLAM S K H, BISWAS G P. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication [J]. Journal of King Saud University — Computer and Information Sciences, 2017, 29(1): 63-73. |
47 | KUMAR V, RAY S, DASGUPTA M, et al. A pairing free identity based two party authenticated key agreement protocol using hexadecimal extended ascii elliptic curve cryptography[J]. Wireless Personal Communications, 2021, 118(4): 3045-3061. |
48 | 俞惠芳,杨柯. 无双线性对的网络编码无证书签密[J]. 电子与信息学报, 2023, 45(10):3752-3758. |
YU H F, YANG K. Certificateless pairing-free signcryption for network coding[J]. Journal of Electronics and Information Technology, 2023, 45(10): 3752-3758. | |
49 | CHEN L, CHENG Z, SMART N P. Identity-based key agreement protocols from pairings [J]. International Journal of Information Security, 2007, 6(4): 213-241. |
50 | SELVI S S D, VIVEK S S, RANGAN C P. Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing [C]// Proceedings of the 2009 Information Security and Cryptology, LNCS 6151. Berlin: Springer, 2010: 75-92. |
51 | 周彦伟,杨波,张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6):1257-1266. |
ZHOU Y W, YANG B, ZHANG W Z. Security analysis and improvement of certificateless signcryption scheme without bilinear pairing [J]. Chinese Journal of Computers, 2016, 39(6): 1257-1266. | |
52 | 杨小东,李梅娟,汪志松,等. 一种无证书签密方案的安全性分析与改进[J]. 山东大学学报(理学版), 2022, 57(9):15-24. |
YANG X D, LI M J, WANG Z S, et al. Security analysis and improvement of a certificateless signcryption scheme [J]. Journal of Shandong University (Natural Science), 2022, 57(9): 15-24. | |
53 | CHEN X, HE D, KHAN M K, et al. A secure certificateless signcryption scheme without pairing for internet of medical things[J]. IEEE Internet of Things Journal, 2023, 10(10): 9136-9147. |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[7] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[9] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[10] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. |
[11] | Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI. Overview of on-chain and off-chain consistency protection technologies [J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. |
[12] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[13] | Kedi NIU, Min LI, Zhongyuan YAO, Xueming SI. Review of blockchain consensus algorithms for internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3678-3687. |
[14] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[15] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||