Frontiers of Data and Computing ›› 2024, Vol. 6 ›› Issue (5): 13-23.

CSTR: 32002.14.jfdc.CN10-1649/TP.2024.05.002

doi: 10.11871/jfdc.issn.2096-742X.2024.05.002

Previous Articles     Next Articles

A Cross Domain Authentication Scheme Based on Distributed Key and BLS Signature

ZHENG Qiding1,2,3(),WANG Hexiang1,2,3,ZHANG Hongwei1,3,*()   

  1. 1. School of Computer Science and Engineering, Tianjin University of technology, Tianjin 300384, China
    2. Tianjin Key Laboratory of Intelligent Computer and Novel Software Technology, Tianjin 300384, China
    3. National Engineering Laboratory of Computer Virus Prevention and Control Technology,Tianjin 300457, China
  • Received:2024-08-07 Online:2024-10-20 Published:2024-10-21

Abstract:

[Objective] In order to solve the problem of node identity authentication in the cross domain traceability system of industrial Internet, this paper proposes Dion, a cross domain authentication scheme based on the distributed key, which aims to overcome the centralization and scalability problems of the certificate authority in the current cross domain authentication scheme. [Methods] Based on the DID decentralized identity technology, this study uses the distributed key generation technology and BLS signature algorithm to build a certificate issuance model, establishes the revocation and update mechanism of user identity certificate through the contract, and uses the certificate to realize cross domain traceability identity authentication. [Results] Experiments on the Ethereum platform simulated the application of the scheme in the cross-domain traceability authentication process. The results show that the scheme realizes the decentralization of the certification authority on the premise of meeting the authentication requirements of cross domain traceability of the industrial Internet, and enhances the system's resistance to the single point of failure. [Conclusions] The DID-based authentication model shows significant potential and application prospects in the field of blockchain technology and provides effective authentication for the interaction between nodes. However, further research is needed in the aspects of authentication efficiency, identity update, and revocation.

Key words: blockchain, cross domain authentication, distributed key, cross domain traceability