信息网络安全 ›› 2025, Vol. 25 ›› Issue (12): 1948-1960.doi: 10.3969/j.issn.1671-1122.2025.12.010

• 理论研究 • 上一篇    下一篇

基于区块链的隐私保护跨域认证协议

张观平, 魏福山, 陈熹, 顾纯祥()   

  1. 信息工程大学网络空间安全学院,郑州 450001
  • 收稿日期:2025-02-10 出版日期:2025-12-10 发布日期:2026-01-06
  • 通讯作者: 顾纯祥 E-mail:gcxiang5209@126.com
  • 作者简介:张观平(2000—),男,江西,硕士研究生,主要研究方向为密码协议分析|魏福山(1983—),男,甘肃,副教授,博士,主要研究方向为安全协议、无线网络的安全认证|陈熹(1988—),男,湖北,讲师,硕士,主要研究方向为密码学、网络安全协议分析|顾纯祥(1976—),男,安徽,教授,博士,主要研究方向为密码协议的安全性分析
  • 基金资助:
    国家重点研发计划(2023YFA1009500);国家自然科学基金(61772548);河南省优秀青年科学基金(222300420099)

Blockchain-Based Privacy-Preserving Cross-Domain Authentication Protocol

ZHANG Guanping, WEI Fushan, CHEN Xi, GU Chunxiang()   

  1. Institute of Cyberspace Security, Information Engineering University, Zhengzhou 450001, China
  • Received:2025-02-10 Online:2025-12-10 Published:2026-01-06
  • Contact: GU Chunxiang E-mail:gcxiang5209@126.com

摘要:

在物联网环境下,跨域认证面临隐私保护不足和依赖可信第三方等问题。为应对这些挑战,文章提出基于区块链的隐私保护跨域认证协议。在区块链技术的支持下,该协议实现了不同参数域实体之间的身份认证与密钥交换,同时有效减轻了服务器和用户端的性能负担。具体而言,用户的生物特征向量经过模糊提取器生成秘密值,结合格加密技术计算密钥,从而在保护用户生物特征隐私的同时完成隐式身份认证。此外,用户在跨域访问过程中生成的伪身份、公钥及各信任域的公共参数被上传至区块链,以确保协议参与方验证结果的正确性和行为的不可抵赖性。在随机预言模型下,基于判定性Learning with Error困难问题和离散对数难题,证明了该协议能够抵抗多项式敌手攻击。与同类协议相比,文章所提协议能够较好地兼容现有安全机制,并具有较低的计算与通信开销,从而为跨域认证提供一种高效且安全的解决方案。

关键词: 生物特征认证, 隐私保护, 区块链, 跨域认证

Abstract:

In the Internet of things environment, cross-domain authentication faces the problems of privacy protection and reliance on a trusted third party. To address these challenges, a blockchain-based privacy-preserving cross-domain authentication protocol was proposed. With the support of blockchain technology, this protocol realized identity authentication and key exchange between entities in different parameter domains, and effectively reduced the performance burden of the server and the user. Specifically, the user’s biometric vector was generated by the fuzzy extractor to generate a secret value, and the key was calculated by combining the lattice encryption technology, so as to complete the implicit identity authentication while protecting the user’s biometric privacy. In addition, the pseudo-identity, public key and public parameters of each trust domain generated by the user in the process of cross-domain access were uploaded to the blockchain to ensure the correctness of the verification results and the non-repudiation of the behavior of the participants in the protocol. In the random oracle model, based on the decisional learning with error problem and the discrete logarithm problem, the semantic security of the protocol under the polynomial adversary ability was proved. Compared with the similar protocols, the proposed protocol is compatible with the existing security mechanisms, and has low computation and communication overhead, thus providing a new solution for cross-domain authentication with high efficiency and security.

Key words: biometric authentication, privacy preserving, blockchain, cross-domain authentication

中图分类号: