Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (4): 1-11.doi: 10.11959/j.issn.2096-109x.2022052

• Topic: Blockchain System, Smart Contract and Application Security •     Next Articles

Blockchain-based high transparent PKI authentication protocol

Liquan CHEN1,2, Xiao LI1, Zheyi YANG1, Sijie QIAN1   

  1. 1 School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China
    2 Purple Mountain Laboratories for Network and Communication Security, Nanjing 211111, China
  • Revised:2022-03-14 Online:2022-08-15 Published:2022-08-01
  • Supported by:
    The National Key R&D Program of China(2020YFE0200600)

Abstract:

The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the existing PKI also has shortcomings of excessive power of certification authority and difficulties in revoking and querying.Blockchain can be used to solve those problems by leveraging its advantages, such as decentralization, high transparency and flat structure.Furthermore, the ability and efficiency of the entire Internet to establish trust relationships may be improved.The transparent public key infrastructure (PKI) certification protocol based on the blockchain was proposed.The TS-PBFT algorithm was designed in the proposed protocol by adopting the threshold signature technology to the Practical Byzantine fault tolerance (PBFT) algorithm.The TS-PBFT algorithm reduced the communication overhead via reducing the communication complexity, strengthened the supervision via introducing external monitoring mechanism in the master node election of the view change protocol, and also improved the performance of the consensus mechanism via adding a batch processing mechanism.Moreover, a transparent blockchain-based PKI certification protocol was designed.The proposed protocol increased the security of certificate revocation and query, it also improved the efficiency of the certificate query by the introduction of counting bloom filters.Besides, the proposed protocol added audit function into the certificate lifecycle management.Accordingly, it can supervise the behavior of the certificate authority (CA), prompt it to improve security standards, and then achieve the purpose of limiting its authority.According to the security analysis and efficiency experiments, the proposed protocol was equipped with security properties, such as the resistance to spoofing certificate application attacks, and it achieved the best performance on TLS/SSL handshake time compared with existing PKI protocols.

Key words: blockchain, Byzantine fault tolerant, public key infrastructure, authentication protocol

CLC Number: 

No Suggested Reading articles found!