当前位置>主页 > 期刊在线 > 物联网 >

物联网2020年8期

基于区块链技术的身份认证与存储方法研究
王乃洲¹’²,金连文¹,高兵²,金晓峰²
(1. 华南理工大学,广东 广州 510641;2. 广电智能安全研究院,广东 广州 510656)

摘  要:目前的网络身份认证系统基本采用中心化的设计方法,该方法存在权限控制失误或中心机构被入侵导致的信息泄露或篡改问题,文章提出了一种基于区块链技术的身份认证与存储方法。将用户身份认证信息的摘要构建相应的Merkle 树并打包记入区块链,通过RSA 和共识算法来保证用户认证信息和系统的安全性。该方法在保证用户信息安全性的同时,具备身份认证的便捷性。


关键词:区块链;身份认证;非对称加密;分布式共识;Merkle 树



中图分类号:TP309;TP311.13         文献标识码:A         文章编号:2096-4706(2020)08-0164-04


Research on Identity Authentication and Storage Method Based on Blockchain Technology

WANG Naizhou1,2,JIN Lianwen1,GAO Bing2,JIN Xiaofeng2

(1.South China University of Technology,Guangzhou 510641,China;2.GRG Banking Intelligent Security Research Institute,Guangzhou 510656,China)

Abstract:The current network identity authentication system mainly employs the centralized design,which has the problem of authority control error and information leakage or tampering caused by the intrusion of the central organization. This paper presents a method of identity authentication and storage based on blockchain technology. The digest of the user authentication information is constructed as a Merkle tree and packed into the blockchain. The RSA and consensus algorithms are used to guarantee the security of the user authentication information and the system. This method has the convenience of identity authentication while ensuring the security of user information.

Keywords:blockchain;authentication;asymmetric encryption;distributed consensus;Merkle tree


参考文献:

[1] MELANIE S. Blockchain:Blueprint for a New Economy [M].O’Reilly Media,Inc,,2015.

[2] 袁勇,王飞跃. 区块链技术发展现状与展望 [J]. 自动化学报,2016,42(4):481-494.

[3] 郑康.A 公司消费类数字资产流通平台商业模式与营销策略研究 [D]. 南京:南京大学,2016.

[4] MELANIE S. Blockchain Thinking :The Brain as aDecentralized Autonomous Corporation [Commentary] [J]. IEEETechnology and Society Magazine,2015,34(4):41-52.

[5] NAKAMOTO S. Bitcoin:A Peer-to-Peer Electronic CashSystem [EB/OL].(2008-08-21).https://bitcoin.org/bitcoin.pdf.

[6] GitHub.Bitcoin Sourcecode [EB/OL].(2016-01-18).https://github.com/bitcoin/bitcoin/.

[7] MERKLE R C. Protocols for Public Key Cryptosystems[C]//1980 IEEE Symposium on Security and Privacy. IEEE,1980:122.

[8] Z Y S K I N D G,Z E K R I FA D M S,A L E X P,e t a l .Decentralizing Privacy:Using Blockchain to Protect Personal Data [C]//IEEE Security & Privacy Workshops. IEEE,2015:180-184.

[9] ANTONOPOULOS A M. Mastering Bitcoin:UnlockingDigital Crypto-Currencies [M]. O’Reilly Media,Inc,2014.


作者简介:

王乃洲(1985—),男,汉族,江苏泗阳人,高级算法研究员,博士研究生,主要研究方向:计算机视觉、区块链;

金连文(1968—),男,汉族,贵州都匀人,教授,博士,主要研究方向:文字识别、计算机视觉,智能系统;

高兵(1976—),男,汉族,辽宁大连人,高级算法研究员,副教授,博士,主要研究方向:数据挖掘、大数据、区块链;

金晓峰(1985—),男,汉族,山东潍坊人,技术副总监,高级工程师,博士,主要研究方向:智能视频分析、模式识别。