信息网络安全 ›› 2025, Vol. 25 ›› Issue (5): 817-827.doi: 10.3969/j.issn.1671-1122.2025.05.013

• 技术研究 • 上一篇    下一篇

基于可信数字身份的轻量级分布式认证方案

朱晓强1(), 张皓文2, 林彦孜2, 刘吉强1   

  1. 1.北京交通大学网络空间安全学院,北京 100044
    2.北京交通大学软件学院,北京 100044
  • 收稿日期:2025-03-06 出版日期:2025-05-10 发布日期:2025-06-10
  • 通讯作者: 朱晓强 xqzhu@bjtu.edu.cn
  • 作者简介:朱晓强(1992—),男,黑龙江,助理教授,博士,主要研究方向为物联网、机器学习、隐私保护|张皓文(1998—),男,山西,硕士研究生,主要研究方向为区块链及安全技术|林彦孜(2005—),女,广西,本科,主要研究方向为区块链|刘吉强(1973—),男,山东,教授,博士,主要研究方向为可信计算、隐私保护、云计算
  • 基金资助:
    国家自然科学基金(62401037);国家重点研发计划(2023YFB2703702);北京交通大学人才基金(2023XKRC016);中国博士后科学基金(GZC20230224);中国博士后科学基金(2024M750166)

Lightweight Distributed Authentication Scheme Based on Trusted Digital Identity

ZHU Xiaoqiang1(), ZHANG Haowen2, LIN Yanzi2, LIU Jiqiang1   

  1. 1. School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing 100044, China
    2. School of Software, Beijing Jiaotong University, Beijing 100044, China
  • Received:2025-03-06 Online:2025-05-10 Published:2025-06-10

摘要:

可信数字身份是现实生活和网络行为的通用凭证。随着分布式系统的普及应用,传统的数字身份管理系统存在单点故障、缺乏互操作性、侵犯隐私等安全挑战。因此,如何在可信数字身份认证过程中保护用户个人隐私,同时减少系统资源开销,提高认证效率至关重要。文章针对身份认证的典型应用场景,提出一种基于可信数字身份的轻量级分布式认证方案。该方案以可信数字身份为基础,映射成去中心化标识符,并结合可验证凭证用于可信数字身份的验证。用户可以基于实人认证控制自己的身份,实现以用户为中心的身份验证。安全性分析和性能分析表明,该方案具有较高的安全性和较好的性能。

关键词: 身份认证, 区块链, 分布式数字身份, 可验证凭证

Abstract:

Trusted digital identity is a universal credential for real-life and online behavior. With the popularization and application of distributed systems, traditional digital identity management systems have security challenges such as single point failure, lack of interoperability, and privacy infringement. Therefore, it is very important to protect the user’s privacy in the process of trusted digital identity authentication while reducing the system’s resource overhead and improving the authentication efficiency. This paper proposed a lightweight distributed authentication scheme based on trusted digital identity for typical application scenarios of identity authentication. The scheme was based on a trusted digital identity, mapped into a decentralized identity, and combined with a verifiable credential for the verification of the trusted digital identity. Users can control their own identity based on real-person authentication, thereby realizing user-centric identity authentication. Security analysis and performance analysis show that the scheme in this paper has higher security and better performance.

Key words: identity authentication, blockchain, distributed digital identity, verifiable credential

中图分类号: