计算机科学与探索 ›› 2024, Vol. 18 ›› Issue (3): 597-611.DOI: 10.3778/j.issn.1673-9418.2304003

• 前沿·综述 • 上一篇    下一篇

基于DID的跨链身份认证研究综述

白伊瑞,田宁,雷虹,刘雪峰,芦翔,周勇   

  1. 1. 海南大学 网络空间安全学院(密码学院),海口 570228
    2. 海南大学 计算机科学与技术学院,海口 570228
    3. 华威大学 制造学院,英国 考文垂 CV4 8UW
    4. 云海链控股股份有限公司,海南 澄迈 571924
    5. 西安电子科技大学 网络与信息安全学院,西安 710126
    6. 中国科学院 信息工程研究所,北京 100864
  • 出版日期:2024-03-01 发布日期:2024-03-01

Overview of Cross-Chain Identity Authentication Based on DID

BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong   

  1. 1. School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China
    2. School of Computer Science and Technology, Hainan University, Haikou 570228, China
    3. Warwick Manufacturing Group, The University of Warwick, Coventry CV4 8UW, United Kingdom
    4. SSC Holding Company Ltd., Chengmai, Hainan 571924, China
    5. School of Network and Information Security, Xidian University, Xi??an 710126, China
    6. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100864, China
  • Online:2024-03-01 Published:2024-03-01

摘要: 随着元宇宙和Web3.0等概念的出现,区块链在很多领域中发挥了非常重要的作用,跨链技术是实现链间互联互通和价值转移的重要技术手段。现阶段,公证人和侧链等传统的跨链技术存在信任问题,同时,跨链身份认证领域中存在各链身份不统一以及身份不掌握在用户自己手中的问题。首先,系统地总结了数字身份和跨链技术的发展历程、技术方案,并对四种数字身份模型和九个主流跨链项目进行分析比较;其次,通过梳理分析近年来跨链身份认证的主要研究成果,设计了跨链身份认证通用模型,并总结出现有方案存在的缺点;然后,重点研究了基于DID的跨链身份认证实现方案,对不同方案进行了技术特点及优缺点分析;在此基础上,总结并设计了三种基于DID的跨链身份认证模型,对主要实现步骤进行了功能描述,并分析其优点、局限性和效率;最后,针对当前基于DID的跨链身份认证模型的不足,讨论了其发展难点并给出了五个未来可发展的研究方向。

关键词: 分布式数字身份, 区块链, 跨链, 身份认证

Abstract: With the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and sidechain have trust issues. At the same time, in the field of cross-chain identity authentication, there are problems that the identities of each chain are not unified and users do not have control over their own identities. Firstly, it systematically summarizes the development process and technical solutions of digital identity and cross-chain technology, and analyzes and compares four digital identity models and nine mainstream cross-chain projects. Secondly, by analyzing the main research results of cross-chain identity authentication in recent years, a general model of cross-chain identity authentication is designed, and the shortcomings of existing solutions are summarized. Then, it focuses on the cross-chain identity authentication implementation scheme based on DID, and analyzes the technical characteristics, advantages and disadvantages of different solutions. On this basis, three DID-based cross-chain identity authentication models are summarized, the main implementation steps are functionally described, and their advantages, limitations and efficiency are analyzed. Finally, in view of the shortcomings of the current DID-based cross-chain identity authentication model, its development difficulties are discussed and five possible future research directions are given.

Key words: decentralized identity, blockchain, cross-chain, identity authentication