A blockchain-based identity authentication method and a blockchain-based identity authentication system

A technology of identity authentication and identity authentication results, which is applied in the field of identity authentication methods and systems based on blockchain, can solve the problems of poor security of unified authentication technology, and achieve high security, time-saving, and fast calculation effects

Active Publication Date: 2019-06-21
朗新数据科技有限公司
View PDF6 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The distributed and decentralized solution of the application of blockchain can so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based identity authentication method and a blockchain-based identity authentication system
  • A blockchain-based identity authentication method and a blockchain-based identity authentication system
  • A blockchain-based identity authentication method and a blockchain-based identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] see figure 1 As shown, the technical solution of this embodiment adopts block chain to carry out unified identity authentication, and its steps are:

[0051] The client receives the preset password x input by the user, and calculates E(f(x)) and E(g(x)) locally according to the preset homomorphic encryption algorithm E;

[0052] The client sends a service request to the server, the service request includes the user public key and E(f(x)), E(g(x)), and the matters to be handled by the client; where f(x)=H 1 (x), g(x)=H 2 (x), where the function H 1 with H 2 are two different one-way hash functions, and H 1 with H 2 The output digits are the same, and the output length is above 256bit;

[0053] The server receives the service request sent by the client, and performs identity authentication through the block chain, and responds to the service request of the client according to the identity authentication result returned by the block chain;

[0054] Specifically, the...

Embodiment 2

[0074] In this example, see image 3 As shown in , after the server obtains the authentication certificate from the blockchain, it performs identity authentication on the authentication server of the server.

[0075]Specifically, the server receives the service request sent by the client, the service request includes the user public key and E(f(x)), E(g(x)), the E(f(x)) and E( g(x)) is calculated by the client according to the preset homomorphic encryption algorithm E, where f(x)=H 1 (x), g(x)=H 2 (x), where the function H 1 with H 2 are two different one-way hash functions, and H 1 with H 2 The output digits are the same, and the output length is above 256 bits; the server sends an authentication credential acquisition request to the smart contract of the blockchain, and the authentication credential acquisition request includes the user public key; the smart contract searches for the user authentication credential through the user public key And return to the server; t...

Embodiment 3

[0078] This embodiment provides a blockchain-based identity authentication system, including a client, a server, and a blockchain. The identity authentication system uses the identity authentication method in Embodiment 1 for unified identity authentication. I won't repeat them here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a blockchain-based identity authentication method and a blockchain-based identity authentication system. The identity authentication method based on the block chain comprisesthe following steps that an intelligent contract of the block chain receives an identity authentication request sent by a server side, the identity authentication request comprises a user public key and E(f (x)), and the E(g (x)), the E(f (x)) and the E(g (x)) are obtained through calculation by a client side according to a preset homomorphic encryption algorithm E; the intelligent contract inquires an authentication certificate Ea of the user on the block chain according to the public key of the user, carries out calculation and verification according to E (f (x)) , E (g (x)) and the homomorphic attribute of a homomorphic encryption algorithm E, and passes identity authentication if the homomorphic attribute is met; and the smart contract returns the identity authentication result to theserver. The method has the beneficial effects that based on the characteristics of the block chain, the threats of replay attacks and violent cracking can be resisted, so that the attack cost is increased. By utilizing a homomorphic encryption attribute equation, the nizk can be constructed, and under the condition that an original credential for user identity authentication is not leaked, the user is proved to have the credential, so that the identity of the user is proved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a blockchain-based identity authentication method and system thereof, which can be applied in application scenarios requiring unified identity authentication. Background technique [0002] With the rapid development of Internet technology, there are more and more electronic identity authentication services. In order to solve the problem of users entering passwords in one place, it has become a trend to quickly and safely perform unified identity authentication in multiple services. The current unified authentication relies on a centralized authentication server. There may be a single point of failure, and because the centralized rights are controlled by a certain server, there are security risks when multiple different organizations use the unified authentication method. [0003] Therefore, providing a block chain-based identity authentication method and its system wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
Inventor 程威李静唐肖旅
Owner 朗新数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products