Javascript must be enabled to continue!
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
View through CrossRef
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trusted party establishes trust between two unfamiliar entities. However, a trusted party's failure or malicious behavior could undermine the trust system. Additionally, traditional authentication methods often involve complex and time-consuming procedures and may incur high costs. With the advancement of technology, more decentralized authentication methods and blockchain-based identity verification solutions have been proposed to address these limitations and enhance the security and efficiency of trust establishment. There are still cases where the number of transfers of their authentication authority should be limited for authentication in blockchain networks. Meanwhile, an authentication scheme consisting only of efficient operations such as hash functions is desirable. However, to the best of our knowledge, blockchain networks have no authentication schemes that consist of only hash functions and allow the transfer of authentication authority. In this paper, we propose an efficient authentication scheme based on only a hash function that can limit the number of times authentication authority can be transferred by using hash chains and Hashcash techniques in a blockchain network. As a result, our scheme has the advantage of reducing the computational complexity and gas costs in smart contracts. Furthermore, we deployed the smart contracts on the Goerli test network and completed authentication, proving the solution's effectiveness. On the Goerli testnet, our smart contract consumed 304.6kgas when deployed and 29.9kgas when performing authentication.
Title: An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Description:
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication.
In traditional authentication, a trust mechanism based on a trusted party establishes trust between two unfamiliar entities.
However, a trusted party's failure or malicious behavior could undermine the trust system.
Additionally, traditional authentication methods often involve complex and time-consuming procedures and may incur high costs.
With the advancement of technology, more decentralized authentication methods and blockchain-based identity verification solutions have been proposed to address these limitations and enhance the security and efficiency of trust establishment.
There are still cases where the number of transfers of their authentication authority should be limited for authentication in blockchain networks.
Meanwhile, an authentication scheme consisting only of efficient operations such as hash functions is desirable.
However, to the best of our knowledge, blockchain networks have no authentication schemes that consist of only hash functions and allow the transfer of authentication authority.
In this paper, we propose an efficient authentication scheme based on only a hash function that can limit the number of times authentication authority can be transferred by using hash chains and Hashcash techniques in a blockchain network.
As a result, our scheme has the advantage of reducing the computational complexity and gas costs in smart contracts.
Furthermore, we deployed the smart contracts on the Goerli test network and completed authentication, proving the solution's effectiveness.
On the Goerli testnet, our smart contract consumed 304.
6kgas when deployed and 29.
9kgas when performing authentication.
Related Results
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
“The margin between the edge of the world and infinite possibility”
“The margin between the edge of the world and infinite possibility”
Purpose
This paper aims to explore a paradoxical situation, asking whether it is possible to reconcile the immutable ledger known as blockchain with the requirements of the General...
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
Blockchain technology has emerged as a disruptive force in the realms of tax compliance and financial regulation, presenting both opportunities and challenges for governments, busi...
Application of the blockchain technology for digital diplomas: problems and prospects
Application of the blockchain technology for digital diplomas: problems and prospects
The purpose of this studyis to analyze possible problems in issuing digital diplomas, using the blockchain technology, and to promote solving these problems as well as to show the ...
Introduction to Blockchain Technology
Introduction to Blockchain Technology
A blockchain is a linked set of records maintained in a decentralized
environment. The records in blockchain are publicly available but cryptographically
secured. The interesting p...
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
BCDAIoD: An Efficient Blockchain-Based Cross-Domain Authentication Scheme for Internet of Drones
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain authentication to prove their identity and receive information from the ground control sta...
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensu...


