计算机科学与探索 ›› 2024, Vol. 18 ›› Issue (3): 597-611.DOI: 10.3778/j.issn.1673-9418.2304003
白伊瑞,田宁,雷虹,刘雪峰,芦翔,周勇
出版日期:
2024-03-01
发布日期:
2024-03-01
BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
Online:
2024-03-01
Published:
2024-03-01
摘要: 随着元宇宙和Web3.0等概念的出现,区块链在很多领域中发挥了非常重要的作用,跨链技术是实现链间互联互通和价值转移的重要技术手段。现阶段,公证人和侧链等传统的跨链技术存在信任问题,同时,跨链身份认证领域中存在各链身份不统一以及身份不掌握在用户自己手中的问题。首先,系统地总结了数字身份和跨链技术的发展历程、技术方案,并对四种数字身份模型和九个主流跨链项目进行分析比较;其次,通过梳理分析近年来跨链身份认证的主要研究成果,设计了跨链身份认证通用模型,并总结出现有方案存在的缺点;然后,重点研究了基于DID的跨链身份认证实现方案,对不同方案进行了技术特点及优缺点分析;在此基础上,总结并设计了三种基于DID的跨链身份认证模型,对主要实现步骤进行了功能描述,并分析其优点、局限性和效率;最后,针对当前基于DID的跨链身份认证模型的不足,讨论了其发展难点并给出了五个未来可发展的研究方向。
白伊瑞, 田宁, 雷虹, 刘雪峰, 芦翔, 周勇. 基于DID的跨链身份认证研究综述[J]. 计算机科学与探索, 2024, 18(3): 597-611.
BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong. Overview of Cross-Chain Identity Authentication Based on DID[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(3): 597-611.
[1] 何帅, 黄襄念, 陈晓亮. 区块链跨链技术发展及应用研究综述[J]. 西华大学学报(自然科学版), 2021, 40(3): 1-14. HE S, HUANG X N, CHEN X L. The research summary of the development and application of blockchain cross-chain technology[J]. Journal of Xihua University (Natural Science Edition), 2021, 40(3): 1-14. [2] BAI Y R, LEI H, LI S Z, et al. Decentralized and self-sovereign identity in the era of blockchain: a survey[C]//Proceedings of the 2022 IEEE International Conference on Blockchain, Espoo, Aug 22-25, 2022. Piscataway: IEEE, 2022: 500-507. [3] 张亚兵, 邢镔. 基于多层区块链的跨域认证方案[J]. 计算机应用研究, 2021, 38(6): 1637-1641. ZHANG Y B, XING B. Cross-domain authentication scheme based on multi-layer blockchain[J]. Application Research of Computers, 2021, 38(6): 1637-1641. [4] KESZTHELYI A. About passwords[J]. Acta Polytechnica Hungarica, 2013, 10(6): 99-118. [5] CELESTI A, TUSA F, VILLARI M, et al. Three-phase cross-cloud federation model: the cloud SSO authentication[C]//Proceedings of the 2010 2nd International Conference on Advances in Future Internet, Venice, Jul 18-25, 2010. Piscataway: IEEE, 2010: 94-101. [6] A brief history of digital identity in time from 1995 to 2018 [EB/OL]. (2018-09-13) [2023-03-02]. http://www.lianmenhu.com/blockchain-6328-1. [7] LENNART A, CONSTANTIN F, ELIAS S. A bibliometric review of research on digital identity: research streams, influential works and future research paths[J]. Journal of Manufacturing Systems, 2022, 62: 523-538. [8] 中钞区块链技术研究院. 四大分布式数字身份架构的对比及研究[EB/OL]. (2020-05-19) [2023-03-12]. https://www. ccvalue.cn/article/221958.html. China Banknote Blockchain Technology Research Institute. Comparative study of four distributed digital identity architectures[EB/OL]. (2020-05-19) [2023-03-12]. https://www.ccvalue.cn/article/221958.html. [9] PREUKSCHAT A, REED D. Self-sovereign identity: decentralized digital identity and verifiable credentials[M]. Shelter Island: Manning, 2021: 21-37. [10] LENNART A, CONSTANTIN F. A bibliometric review of research on digital identity: research streams, influential works and future research paths[J]. Journal of Manufacturing Systems, 2022, 62: 523-538. [11] MICHAEL S, ANNA Z J. An identity provider as a service platform for the edugain research and education community[C]//Proceedings of the 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, Arlington, Apr 8-12, 2019. Piscataway: IEEE, 2019: 739-740. [12] MüHLE A, GRüNER A, GAYVORONSKAYA T, et al. A survey on essential components of a self-sovereign identity[J]. Computer Science Review, 2018(30): 80-86. [13] MUKTA R, PAIK H Y, LU Q, et al. CredTrust: credential based issuer management for trust in self-sovereign identity[C]//Proceedings of the 2022 IEEE International Conference on Blockchain, Espoo, Aug 22-25, 2022. Piscataway: IEEE, 2022: 334-339. [14] WILCOX-O’HEARN Z. Decentralized, secure, human-meaningful: choose two[EB/OL]. (2001-10-12) [2023-03-12]. https://web.archive.org/web/20011020191610/http://zooko.com/ distnames.html. [15] LIM S, RHIE M, HWANG D, et al. A subject-centric cre-dential management method based on the verifiable cre-dentials[C]//Proceedings of the 2021 International Conference on Information Networking, Jeju Island, Jan 13-16, 2021. Piscataway: IEEE, 2021: 508-510. [16] NAIK N, JENKINS P. A secure mobile cloud identity: criteria for effective identity and access management standards[C]//Proceedings of the 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, Mar 29-Apr 1, 2016. Piscataway: IEEE, 2016: 89-90. [17] DIEYE M, VALIORGUE P, GELAS J P, et al. A self-sovereign identity based on zero-knowledge proof and blockchain[J]. IEEE Access, 2023, 11: 49445-49455. [18] LUX Z A, BEIERLE F, ZICKAU S, et al. Full-text search for verifiable credential metadata on distributed ledgers[C]//Proceedings of the 2019 6th International Conference on Internet of Things: Systems, Management and Security, Gra-nada, Oct 22-25, 2019. Piscataway: IEEE, 2019: 519-528. [19] MüHLE A, GRüNER A, GAYVORONSKAYA T, et al. A survey on essential components of a self-sovereign identity[J]. Computer Science Review, 2018, 30: 80-86. [20] Decentralized identity (DID) research report: important practices of Web 3.0 development[EB/OL]. (2022-10-03) [2023- 03-11]. https://www.ccvalue.cn/article.html. [21] LEE Y E, KIM H W, LEE M J. NextAuction: a DID-based robust auction service for digital contents[J]. Journal of the Korea Society of Computer and Information, 2022, 27(2): 115-124. [22] VITALIK B. Chain interoperability[EB/OL]. (2016-07-08) [2023-03-01]. https://docslib.org/doc/5895634/chain-interoperability-vitalik-buterin. [23] 郭朝, 郭帅印, 张胜利, 等. 区块链跨链技术分析[J]. 物联网学报, 2020, 4(2): 35-48. GUO C, GUO S Y, ZHANG S L, et al. Analysis of cross-chain technology of blockchain[J]. Chinese Journal on Internet of Things, 2020, 4(2): 35-48. [24] 孙浩, 毛瀚宇, 张岩峰, 等. 区块链跨链技术发展及应用[J]. 计算机科学, 2022, 49(5): 287-295. SUN H, MAO H Y, ZHANG Y F, et al. Development and application of blockchain cross-chain technology[J]. Computer Science, 2022, 49 (5): 287-295. [25] BACK A, CORALLO M, DASHJR L, et al. Enabling blockchain innovations with pegged sidechains[EB/OL]. (2014-05-13) [2023-03-09]. http://www.opensciencereview.com/papers/ 123/enablingblockchain-innovations-with-pegged-sidechains. [26] 陈畅. 区块链安全跨链技术研究[D]. 广州: 广州大学, 2022. CHEN C. Research on blockchain security cross-chain technology[D]. Guangzhou: Guangzhou University, 2022. [27] 李芳, 李卓然, 赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6): 1649-1660. LI F, LI Z R, ZHAO H. Research on the progress in cross-chain technology of blockchains[J]. Journal of Software, 2019, 30(6): 1649-1660. [28] GUO Z, LIU L, LIANG Z, et al. Blockchain cross-chain technology research[C]//Proceedings of the 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference, Chongqing, Dec 16-18, 2022. Piscataway: IEEE, 2022: 1064-1070. [29] CHANDRA G B, RAMAKRISHNA V, GOVINDARAJAN C, et al. Decentralized cross-network identity management for blockchain interoperation[EB/OL]. (2021-07-07) [2023-03-07]. http://arxiv.org/abs/2104.03277. [30] 孟博, 王乙丙, 赵璨, 等. 区块链跨链协议综述[J]. 计算机科学与探索, 2022, 16(10): 2177-2192. MENG B, WANG Y B, ZHAO C, et al. Survey on cross-chain protocols of blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(10): 2177-2192. [31] GIACOBINO A, GRIERSON D, SINGH H P, et al. Cosmos Cash: public permissionless approach towards SSI and use cases[C]//Proceedings of the 2022 IEEE International Conference on Block-chain, Espoo, Aug 22-25, 2022. Pisca-taway: IEEE, 2022: 462-467. [32] WOOD G. Polkadot: vision for a heterogeneous multi-chain framework[EB/OL]. (2016-10-18) [2023-03-12]. https://assets. polkadot.network/Polkadot-whitepaper.pdf. [33] BAO Z, WANG Q, ZHANG Y, et al. TPRou: a privacy-preserving routing for payment channel networks[C]//Proceedings of the 26th European Symposium on Research in Computer Security, Darmstadt, Sep 13-17, 2021. Cham: Springer, 2021: 630-648. [34] OU W, HUANG S Y, ZHENG J J, et al. An overview on cross-chain: mechanism, platforms, challenges and advances[J]. Computer Networks, 2022,218: 1389-1286. [35] ADRIAN H B, STEFAN T. Interledger: creating a standard for payments[C]//Proceedings of the 25th International Conference Companion on World Wide Web, Apr 11, 2016. New York: ACM, 2016: 281-282. [36] POON J, DRYJA T. The bitcoin lightning network: scalable off-chain instant payments[EB/OL]. (2016-12-19) [2023-03- 11]. https://lightningnetwork/lightning-network-paper.pdf. [37] LIN S, KONG Y, NIE S, et al. Research on cross-chain technology of blockchain[C]//Proceedings of the 2021 6th International Conference on Smart Grid and Electrical Automation, Kunming, May 29-30, 2021. Piscataway: IEEE, 2021: 405-408. [38] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39. WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency[J]. Netinfo Security, 2017(7): 32-39. [39] QASSE I A, ABU T M, NASIR Q. Inter blockchain communication: a survey[C]//Proceedings of the 6th Annual International Conference on Arab Women in Computing. New York: ACM, 2019: 1-6. [40] WANG W, NING H, XIN L. BlockCAM: a block-chain-based cross-domain authentication model[C]//Proceedings of the 2018 IEEE 3rd International Conference on Data Science in Cyberspace. Piscataway: IEEE, 2018: 896-901. [41] 火链科技研究院.区块链数字身份:数字经济时代基础设施[EB/OL]. (2022-09-19) [2023-03-09]. https://img3.gelonghui.com/pdf/e7923-13813235-c970-4513-a64e-f35448ce5849.pdf. FireChain Technology Research Institute. Blockchain digital identity: infrastructure in the digital economy era[EB/OL]. (2022-09-19) [2023-03-09]. https://img3.gelonghui.com/ pdf/e7923-13813235-c970-4513-a64e-f35448ce5849.pdf. [42] 董贵山, 张兆雷, 李洪伟, 等. 基于区块链的异构身份联盟与监管体系架构和关键机制[J]. 通信技术, 2020, 53(2): 401-413. DONG G S, ZHANG Z L, LI H W, et al. Regulatory system architecture and key mechanisms of blockchain-based heterogeneous identity alliance[J]. Communications Technology, 2020, 53(2): 401-413. [43] 邓小鸿, 朱年红, 黄磊, 等. 基于区块链的身份托管模型研究[J]. 计算机工程与应用, 2020, 56(4): 24-30. DENG X H, ZHU N H, HUANG L, et al. Research on identity trusteeship model based on blockchain[J]. Computer Engineering and Applications, 2020, 56(4): 24-30. [44] YOON D, MOON S, PARK K, et al. Blockchain-based personal data trading system using decentralized identifiers and verifiable credentials[C]//Proceedings of the 2021 International Conference on Information and Communication Technology Convergence, Jeju Island, Oct 20-22, 2021. Piscataway: IEEE, 2021: 150-154. [45] LIU Y Z, LIU A D, XIA Y, et al. A blockchain-based cross-domain authentication management system for IoT devices[J]. IEEE Transactions on Network Science and Engineering, 2023. DOI: 10.1109/TNSE.2023.3292624. [46] 杨淳, 李经纬, 李洪伟, 等. 异构身份联盟统一身份标识模型研究[J]. 信息安全与通信保密, 2019(6): 27-35. YANG C, LI J W, LI H W, et al. A research on heterogeneous identity alliance unified identity model[J]. Infor-mation Security and Communication Security, 2019(6): 27-35. [47] 陈武阳. 基于区块链的PKI身份认证的研究[D]. 兰州: 兰州理工大学, 2020. CHEN W Y. Research on PKI identity authentication based on blockchain[D]. Lanzhou: Lanzhou University of Technology, 2020. [48] SHAO S S, CHEN F, XIAO X Y, et al. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT[J]. Wold Wide Web-Internet and Web Information Systems, 2021, 24: 1665-1690. [49] 王洒洒, 戴炳荣, 朱孟禄, 等. 面向跨链系统的用户身份标识认证模型[J]. 计算机工程与应用, 2022, 58(19): 135-141. WANG S S, DAI B R, ZHU M L, et al. User identity au-thentication model for cross-chain system[J]. Computer Engineering and Applications, 2022, 58(19): 135-141. [50] LI X Y, ZHENG Z Y, CHENG P Y, et al. A multi-channel anonymous consensus based on Tor[J]. World Wide Web-Internet and Web Information Systems, 2022, 26(3): 1005-1029. [51] 雷志伟, 朱义, 张健, 等. 一种可监管的区块链跨链平台设计[J]. 计算机与数字工程, 2021, 49(12): 2544-2550. LEI Z W, ZHU Y, ZHANG J, et al. Design of a supervised blockchain cross chain platform[J]. Computer & Digital Engineering, 2021, 49(12): 2544-2550. [52] 王姝爽, 马兆丰, 刘嘉微, 等. 区块链跨链安全接入与身份认证方案研究与实现[J]. 信息网络安全, 2022, 22(6): 61-72. WANG S S, MA Z F, LIU J W, et al. Research and imple-mentation of cross-chain security access and identity authentication scheme of blockchain[J]. Netinfo Security, 2022, 22(6): 61-72. [53] CHAO P. Research on cross-chain communication based on decentralized identifier[C]//Proceedings of the 2021 4th International Conference on Hot Information-Centric Networking, Nanjing, Nov 25-27, 2021. Piscataway: IEEE, 2021: 7-12. [54] WANG X. A credible transfer method of cross-chain assets based on DID and VC[C]//Proceedings of the IEEE 4th International Conference on Information Systems and Computer Aided Education, Dalian, Sep 24-26, 2021. Piscataway: IEEE, 2021: 238-242. [55] XIE T X, ZHANG Y, GAI K K, et al. Cross-chain-based decentralized identity for mortgage loans[C]//Proceedings of the 14th International Conference on Knowledge Science, Engineering, and Management, Tokyo, Aug 14-16, 2021.Cham: Springer, 2021: 619-633. [56] ZHONG T, SHI P C, CHANG J S. JointCloud cross-chain verification model of decentralized identifiers[C]//Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference, Austin, Oct 29-31, 2021. Piscataway: IEEE, 2021: 1-8. [57] ZHAO F X, YU J G, YAN B W. Towards cross-chain access control model for medical data sharing[J]. Procedia Computer Science, 2022, 202: 330-335. [58] REN Q, LIU H, LI Y, et al. Cloak: a framework for development of confidential blockchain smart contracts[C]//Proceedings of the 2021 International Conference on Distributed Computing Systems. Piscataway: IEEE, 2021: 1102-1105. [59] LI D, LIU J, TANG Z, et al. Agentchain: a decentralized cross-chain exchange system[C]//Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/the 13th IEEE International Conference on Big Data Science and Engineering, Rotorua, Aug 5-8, 2019. Piscataway: IEEE, 2019: 491-498. [60] WANG Q, ZHANG Y, BAO Z, et al. SorTEE: service-oriented routing for payment channel networks with scalability and privacy protection[J]. IEEE Transactions on Network and Service Management, 2022, 19(4): 3764-3780. [61] QASSE I A, ABU T M, NASIR Q. Inter blockchain communication: a survey[C]//Proceedings of the 6th Annual International Conference on Arab Women in Computing. New York: ACM, 2019: 1-6. [62] 颜阳, 王斌, 邹均. 区块链+赋能数字经济[M]. 北京: 机械工业出版社, 2018: 157-211. YAN Y, WANG B, ZOU J. Blockchain+empowering digital economy[M]. Beijing: China Machine Press, 2018: 157-211. |
[1] | 张文韬, 黄建华, 顾彬, 宁宇豪, 宫在为. DAGGraph: 适合移动自组网的区块链[J]. 计算机科学与探索, 2024, 18(1): 252-264. |
[2] | 王心, 王雅生, 张书华, 王新宇, 徐帅. 区块链技术下绿色供应链减排策略与智能合约[J]. 计算机科学与探索, 2024, 18(1): 265-278. |
[3] | 陈先意, 王康, 丁思哲, 付章杰. 区块链互操作性技术研究进展[J]. 计算机科学与探索, 2024, 18(1): 75-92. |
[4] | 霍炜, 张琼露, 欧嵬, 韩文报. 面向区块链的物联网终端跨域认证方法综述[J]. 计算机科学与探索, 2023, 17(9): 1995-2014. |
[5] | 田海博, 叶婉. 跨链数字资产风险管理策略及分析[J]. 计算机科学与探索, 2023, 17(9): 2219-2228. |
[6] | 王群, 李馥娟, 倪雪莉, 夏玲玲, 梁广俊, 马卓. 区块链互操作性及跨链技术研究[J]. 计算机科学与探索, 2023, 17(8): 1749-1775. |
[7] | 刘强, 宋宝燕, 纪婉婷, 王俊陆. 区块链多矿池恶意攻击模型研究[J]. 计算机科学与探索, 2023, 17(7): 1719-1728. |
[8] | 张立, 段明达, 万剑雄, 李雷孝, 刘楚仪. 车联网区块链吞吐量优化的深度强化学习方法研究[J]. 计算机科学与探索, 2023, 17(7): 1708-1718. |
[9] | 庞俊, 刘晨, 郝琨, 于明鹤, 信俊昌, 姜承扬. 基于时序索引的可编辑区块链模型研究[J]. 计算机科学与探索, 2023, 17(5): 1180-1188. |
[10] | 李昕航, 李超, 张桂刚, 邢春晓. 区块链与数据库技术融合综述[J]. 计算机科学与探索, 2023, 17(4): 761-770. |
[11] | 黄敏敏, 袁凌云, 潘雪, 张杰. 边缘计算与区块多链下的安全可信认证模型[J]. 计算机科学与探索, 2023, 17(3): 733-747. |
[12] | 刘同来, 章子凯, 武继刚. 面向医疗图像协同分析的系统模型及访问控制[J]. 计算机科学与探索, 2022, 16(8): 1779-1791. |
[13] | 王群, 李馥娟, 倪雪莉, 夏玲玲, 王振力, 梁广俊. 区块链共识算法及应用研究[J]. 计算机科学与探索, 2022, 16(6): 1214-1242. |
[14] | 熊啸, 李雷孝, 高静, 高昊昱, 杜金泽, 郑岳, 牛铁铭. 区块链在车联网数据共享领域的研究进展[J]. 计算机科学与探索, 2022, 16(5): 1008-1024. |
[15] | 韩刚, 吕英泽, 罗维, 王嘉乾. 重大疫情患者隐私数据保护方案研究[J]. 计算机科学与探索, 2022, 16(2): 359-371. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 448
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 557
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||