Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (2): 77-86.doi: 10.11959/j.issn.2096-109x.2020021

• Special Column:Blockchain Technology • Previous Articles     Next Articles

P2P network identity authentication mechanism based on trusted alliance

Yingying CHEN1,Feng ZHANG1,Wenbao JIANG1,2(),Xu ZHOU2   

  1. 1 School of Information Management,Beijing Information Science and Technology University,Beijing 100089,China
    2 Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China
  • Revised:2020-03-25 Online:2020-04-15 Published:2020-04-23
  • Supported by:
    Capacity Building of Scientific and Technological Innovation Service-Construction of Innovation Platform for Cyberspace Security Discipline(7F1910917);The National Key R&D Program of China(2018YFB1800100)

Abstract:

In order to effectively solve the problems of CA's cross certification and single point of failure in traditional PKI system,a new identity authentication mechanism was proposed.Firstly,this mechanism built the basic architecture based on blockchain,and built the trusted alliance by dynamically generating trusted nodes.Secondly,the whole network unified unique identity was proposed and used a new data structure,named SRT,to store.Finally,all nodes in the network could mutual authentication through the double layer consensus mechanism.Experiments show that this mechanism can meet the query and management of massive user identity information,and ensure the efficiency and security in the identity authentication process.

Key words: blockchain, trusted alliance, identity authentication

CLC Number: 

No Suggested Reading articles found!