Netinfo Security ›› 2018, Vol. 18 ›› Issue (7): 7-9.doi: 10.3969/j.issn.1671-1122.2018.07.002

• Orginal Article • Previous Articles     Next Articles

Design of Secure eID and Identity Authentication Agreement in Mobile Terminal Based on Guomi Algorithm and Blockchain

Wei HU1, Qiuhan WU1(), Shengli LIU2, Wei FU1   

  1. 1. Department of Information Security, Naval University of Engineering, Wuhan Hubei 430033, China
    2. Beijing Aerospace Control Center, Beijing 100094, China
  • Received:2018-04-18 Online:2018-07-15 Published:2020-05-11

Abstract:

Currently, there are many accesses to gain the card readers of the second generation of resident identity cards, which are inexpensive and easy to be misused by the criminals to obtain citizens’ identity privacy information so that they can use it to commit fraud, illegally open up credit cards and other crimes. Besides, when people are checking in the hotels or opening an account in the banks, these institutions which need to verify citizens’ identity under real name mechanism mostly use the centralized authentication method and largely save their real name information in cleartext. Compared with the RSA algorithm and International criterion ECC algorithm that used in the traditional authentication, the SM2 algorithm has better security performance, less demand for storage space and higher speed of signing. So, it is appropriate to be applied in the smart phones and other popular mobile terminals. The blockchain technology has the feature of decentralition and it’s difficult to be tampered. It can effectively solve the problems lay in centralized authentication, including the single point failure and difficulty in the trust issue in multiple CA structure. Therefore, to solve the privacy leakage problems in above scenarios, the paper modified the conventional certification system, proposed an identity authentication system which is based on SM2 algorithm and blockchain technology and combined two-dimensional code and facial recognition technologies, and finally designed an identity authentication agreement elaborately.

Key words: SM2 algorithm, blockchain, identity authentication, mobile terminal

CLC Number: