Blockchain-based multi-purpose authentication method for anonymity and privacy

1Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Various applications using smart contract, a leading application technology of blockchain, are being rapidly introduced to the industrial sector. As a result, services in various fields are actively being developed. Currently, most of the services are offered on a variety of platforms, not blockchain-based. If these services are linked to prepaid features that provide anonymity in smart contracts, a more diverse service scenario could be created. In this paper, we propose scenarios that provide certification for various purposes based on smart contracts. It provides a scenario that provides the privacy of the contract signed by the customer while retaining the anonymity provided by blockchain. Smart contracts register keys that do not give a clue to guess the encoding keys and deliver hash functions of the child keys that change each time with authentication parameters.In addition, the master seed that can generate these authentication parameters is designed to be kept only by the user and the service provider to be able to verify them. It is proposed by considering both a single service provider transaction and a smart contract authentication model that is shared with a large number of service providers. To generate these child keys, we proposed a mechanism to use the method of generation of child keys based on the Elastic Curve Cryptography public-key method. Various attack scenarios were analyzed to complement the scenario and the efficiency of the proposed mechanism was analyzed. In addition, differences and excellence were compared by organizing scenarios that had the same purpose as scenarios in the relevant study.

Cite

CITATION STYLE

APA

Lee, Y. J., & Lee, K. M. (2019). Blockchain-based multi-purpose authentication method for anonymity and privacy. International Journal of Recent Technology and Engineering, 8(2 Special Issue 6), 409–414. https://doi.org/10.35940/ijrte.B1077.0782S619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free