Journal of Frontiers of Computer Science and Technology ›› 2024, Vol. 18 ›› Issue (3): 597-611.DOI: 10.3778/j.issn.1673-9418.2304003
• Frontiers·Surveys • Previous Articles Next Articles
BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
Online:
2024-03-01
Published:
2024-03-01
白伊瑞,田宁,雷虹,刘雪峰,芦翔,周勇
BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong. Overview of Cross-Chain Identity Authentication Based on DID[J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(3): 597-611.
白伊瑞, 田宁, 雷虹, 刘雪峰, 芦翔, 周勇. 基于DID的跨链身份认证研究综述[J]. 计算机科学与探索, 2024, 18(3): 597-611.
Add to citation manager EndNote|Ris|BibTeX
URL: http://fcst.ceaj.org/EN/10.3778/j.issn.1673-9418.2304003
[1] 何帅, 黄襄念, 陈晓亮. 区块链跨链技术发展及应用研究综述[J]. 西华大学学报(自然科学版), 2021, 40(3): 1-14. HE S, HUANG X N, CHEN X L. The research summary of the development and application of blockchain cross-chain technology[J]. Journal of Xihua University (Natural Science Edition), 2021, 40(3): 1-14. [2] BAI Y R, LEI H, LI S Z, et al. Decentralized and self-sovereign identity in the era of blockchain: a survey[C]//Proceedings of the 2022 IEEE International Conference on Blockchain, Espoo, Aug 22-25, 2022. Piscataway: IEEE, 2022: 500-507. [3] 张亚兵, 邢镔. 基于多层区块链的跨域认证方案[J]. 计算机应用研究, 2021, 38(6): 1637-1641. ZHANG Y B, XING B. Cross-domain authentication scheme based on multi-layer blockchain[J]. Application Research of Computers, 2021, 38(6): 1637-1641. [4] KESZTHELYI A. About passwords[J]. Acta Polytechnica Hungarica, 2013, 10(6): 99-118. [5] CELESTI A, TUSA F, VILLARI M, et al. Three-phase cross-cloud federation model: the cloud SSO authentication[C]//Proceedings of the 2010 2nd International Conference on Advances in Future Internet, Venice, Jul 18-25, 2010. Piscataway: IEEE, 2010: 94-101. [6] A brief history of digital identity in time from 1995 to 2018 [EB/OL]. (2018-09-13) [2023-03-02]. http://www.lianmenhu.com/blockchain-6328-1. [7] LENNART A, CONSTANTIN F, ELIAS S. A bibliometric review of research on digital identity: research streams, influential works and future research paths[J]. Journal of Manufacturing Systems, 2022, 62: 523-538. [8] 中钞区块链技术研究院. 四大分布式数字身份架构的对比及研究[EB/OL]. (2020-05-19) [2023-03-12]. https://www. ccvalue.cn/article/221958.html. China Banknote Blockchain Technology Research Institute. Comparative study of four distributed digital identity architectures[EB/OL]. (2020-05-19) [2023-03-12]. https://www.ccvalue.cn/article/221958.html. [9] PREUKSCHAT A, REED D. Self-sovereign identity: decentralized digital identity and verifiable credentials[M]. Shelter Island: Manning, 2021: 21-37. [10] LENNART A, CONSTANTIN F. A bibliometric review of research on digital identity: research streams, influential works and future research paths[J]. Journal of Manufacturing Systems, 2022, 62: 523-538. [11] MICHAEL S, ANNA Z J. An identity provider as a service platform for the edugain research and education community[C]//Proceedings of the 2019 IFIP/IEEE Symposium on Integrated Network and Service Management, Arlington, Apr 8-12, 2019. Piscataway: IEEE, 2019: 739-740. [12] MüHLE A, GRüNER A, GAYVORONSKAYA T, et al. A survey on essential components of a self-sovereign identity[J]. Computer Science Review, 2018(30): 80-86. [13] MUKTA R, PAIK H Y, LU Q, et al. CredTrust: credential based issuer management for trust in self-sovereign identity[C]//Proceedings of the 2022 IEEE International Conference on Blockchain, Espoo, Aug 22-25, 2022. Piscataway: IEEE, 2022: 334-339. [14] WILCOX-O’HEARN Z. Decentralized, secure, human-meaningful: choose two[EB/OL]. (2001-10-12) [2023-03-12]. https://web.archive.org/web/20011020191610/http://zooko.com/ distnames.html. [15] LIM S, RHIE M, HWANG D, et al. A subject-centric cre-dential management method based on the verifiable cre-dentials[C]//Proceedings of the 2021 International Conference on Information Networking, Jeju Island, Jan 13-16, 2021. Piscataway: IEEE, 2021: 508-510. [16] NAIK N, JENKINS P. A secure mobile cloud identity: criteria for effective identity and access management standards[C]//Proceedings of the 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, Mar 29-Apr 1, 2016. Piscataway: IEEE, 2016: 89-90. [17] DIEYE M, VALIORGUE P, GELAS J P, et al. A self-sovereign identity based on zero-knowledge proof and blockchain[J]. IEEE Access, 2023, 11: 49445-49455. [18] LUX Z A, BEIERLE F, ZICKAU S, et al. Full-text search for verifiable credential metadata on distributed ledgers[C]//Proceedings of the 2019 6th International Conference on Internet of Things: Systems, Management and Security, Gra-nada, Oct 22-25, 2019. Piscataway: IEEE, 2019: 519-528. [19] MüHLE A, GRüNER A, GAYVORONSKAYA T, et al. A survey on essential components of a self-sovereign identity[J]. Computer Science Review, 2018, 30: 80-86. [20] Decentralized identity (DID) research report: important practices of Web 3.0 development[EB/OL]. (2022-10-03) [2023- 03-11]. https://www.ccvalue.cn/article.html. [21] LEE Y E, KIM H W, LEE M J. NextAuction: a DID-based robust auction service for digital contents[J]. Journal of the Korea Society of Computer and Information, 2022, 27(2): 115-124. [22] VITALIK B. Chain interoperability[EB/OL]. (2016-07-08) [2023-03-01]. https://docslib.org/doc/5895634/chain-interoperability-vitalik-buterin. [23] 郭朝, 郭帅印, 张胜利, 等. 区块链跨链技术分析[J]. 物联网学报, 2020, 4(2): 35-48. GUO C, GUO S Y, ZHANG S L, et al. Analysis of cross-chain technology of blockchain[J]. Chinese Journal on Internet of Things, 2020, 4(2): 35-48. [24] 孙浩, 毛瀚宇, 张岩峰, 等. 区块链跨链技术发展及应用[J]. 计算机科学, 2022, 49(5): 287-295. SUN H, MAO H Y, ZHANG Y F, et al. Development and application of blockchain cross-chain technology[J]. Computer Science, 2022, 49 (5): 287-295. [25] BACK A, CORALLO M, DASHJR L, et al. Enabling blockchain innovations with pegged sidechains[EB/OL]. (2014-05-13) [2023-03-09]. http://www.opensciencereview.com/papers/ 123/enablingblockchain-innovations-with-pegged-sidechains. [26] 陈畅. 区块链安全跨链技术研究[D]. 广州: 广州大学, 2022. CHEN C. Research on blockchain security cross-chain technology[D]. Guangzhou: Guangzhou University, 2022. [27] 李芳, 李卓然, 赵赫. 区块链跨链技术进展研究[J]. 软件学报, 2019, 30(6): 1649-1660. LI F, LI Z R, ZHAO H. Research on the progress in cross-chain technology of blockchains[J]. Journal of Software, 2019, 30(6): 1649-1660. [28] GUO Z, LIU L, LIANG Z, et al. Blockchain cross-chain technology research[C]//Proceedings of the 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference, Chongqing, Dec 16-18, 2022. Piscataway: IEEE, 2022: 1064-1070. [29] CHANDRA G B, RAMAKRISHNA V, GOVINDARAJAN C, et al. Decentralized cross-network identity management for blockchain interoperation[EB/OL]. (2021-07-07) [2023-03-07]. http://arxiv.org/abs/2104.03277. [30] 孟博, 王乙丙, 赵璨, 等. 区块链跨链协议综述[J]. 计算机科学与探索, 2022, 16(10): 2177-2192. MENG B, WANG Y B, ZHAO C, et al. Survey on cross-chain protocols of blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(10): 2177-2192. [31] GIACOBINO A, GRIERSON D, SINGH H P, et al. Cosmos Cash: public permissionless approach towards SSI and use cases[C]//Proceedings of the 2022 IEEE International Conference on Block-chain, Espoo, Aug 22-25, 2022. Pisca-taway: IEEE, 2022: 462-467. [32] WOOD G. Polkadot: vision for a heterogeneous multi-chain framework[EB/OL]. (2016-10-18) [2023-03-12]. https://assets. polkadot.network/Polkadot-whitepaper.pdf. [33] BAO Z, WANG Q, ZHANG Y, et al. TPRou: a privacy-preserving routing for payment channel networks[C]//Proceedings of the 26th European Symposium on Research in Computer Security, Darmstadt, Sep 13-17, 2021. Cham: Springer, 2021: 630-648. [34] OU W, HUANG S Y, ZHENG J J, et al. An overview on cross-chain: mechanism, platforms, challenges and advances[J]. Computer Networks, 2022,218: 1389-1286. [35] ADRIAN H B, STEFAN T. Interledger: creating a standard for payments[C]//Proceedings of the 25th International Conference Companion on World Wide Web, Apr 11, 2016. New York: ACM, 2016: 281-282. [36] POON J, DRYJA T. The bitcoin lightning network: scalable off-chain instant payments[EB/OL]. (2016-12-19) [2023-03- 11]. https://lightningnetwork/lightning-network-paper.pdf. [37] LIN S, KONG Y, NIE S, et al. Research on cross-chain technology of blockchain[C]//Proceedings of the 2021 6th International Conference on Smart Grid and Electrical Automation, Kunming, May 29-30, 2021. Piscataway: IEEE, 2021: 405-408. [38] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39. WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency[J]. Netinfo Security, 2017(7): 32-39. [39] QASSE I A, ABU T M, NASIR Q. Inter blockchain communication: a survey[C]//Proceedings of the 6th Annual International Conference on Arab Women in Computing. New York: ACM, 2019: 1-6. [40] WANG W, NING H, XIN L. BlockCAM: a block-chain-based cross-domain authentication model[C]//Proceedings of the 2018 IEEE 3rd International Conference on Data Science in Cyberspace. Piscataway: IEEE, 2018: 896-901. [41] 火链科技研究院.区块链数字身份:数字经济时代基础设施[EB/OL]. (2022-09-19) [2023-03-09]. https://img3.gelonghui.com/pdf/e7923-13813235-c970-4513-a64e-f35448ce5849.pdf. FireChain Technology Research Institute. Blockchain digital identity: infrastructure in the digital economy era[EB/OL]. (2022-09-19) [2023-03-09]. https://img3.gelonghui.com/ pdf/e7923-13813235-c970-4513-a64e-f35448ce5849.pdf. [42] 董贵山, 张兆雷, 李洪伟, 等. 基于区块链的异构身份联盟与监管体系架构和关键机制[J]. 通信技术, 2020, 53(2): 401-413. DONG G S, ZHANG Z L, LI H W, et al. Regulatory system architecture and key mechanisms of blockchain-based heterogeneous identity alliance[J]. Communications Technology, 2020, 53(2): 401-413. [43] 邓小鸿, 朱年红, 黄磊, 等. 基于区块链的身份托管模型研究[J]. 计算机工程与应用, 2020, 56(4): 24-30. DENG X H, ZHU N H, HUANG L, et al. Research on identity trusteeship model based on blockchain[J]. Computer Engineering and Applications, 2020, 56(4): 24-30. [44] YOON D, MOON S, PARK K, et al. Blockchain-based personal data trading system using decentralized identifiers and verifiable credentials[C]//Proceedings of the 2021 International Conference on Information and Communication Technology Convergence, Jeju Island, Oct 20-22, 2021. Piscataway: IEEE, 2021: 150-154. [45] LIU Y Z, LIU A D, XIA Y, et al. A blockchain-based cross-domain authentication management system for IoT devices[J]. IEEE Transactions on Network Science and Engineering, 2023. DOI: 10.1109/TNSE.2023.3292624. [46] 杨淳, 李经纬, 李洪伟, 等. 异构身份联盟统一身份标识模型研究[J]. 信息安全与通信保密, 2019(6): 27-35. YANG C, LI J W, LI H W, et al. A research on heterogeneous identity alliance unified identity model[J]. Infor-mation Security and Communication Security, 2019(6): 27-35. [47] 陈武阳. 基于区块链的PKI身份认证的研究[D]. 兰州: 兰州理工大学, 2020. CHEN W Y. Research on PKI identity authentication based on blockchain[D]. Lanzhou: Lanzhou University of Technology, 2020. [48] SHAO S S, CHEN F, XIAO X Y, et al. IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT[J]. Wold Wide Web-Internet and Web Information Systems, 2021, 24: 1665-1690. [49] 王洒洒, 戴炳荣, 朱孟禄, 等. 面向跨链系统的用户身份标识认证模型[J]. 计算机工程与应用, 2022, 58(19): 135-141. WANG S S, DAI B R, ZHU M L, et al. User identity au-thentication model for cross-chain system[J]. Computer Engineering and Applications, 2022, 58(19): 135-141. [50] LI X Y, ZHENG Z Y, CHENG P Y, et al. A multi-channel anonymous consensus based on Tor[J]. World Wide Web-Internet and Web Information Systems, 2022, 26(3): 1005-1029. [51] 雷志伟, 朱义, 张健, 等. 一种可监管的区块链跨链平台设计[J]. 计算机与数字工程, 2021, 49(12): 2544-2550. LEI Z W, ZHU Y, ZHANG J, et al. Design of a supervised blockchain cross chain platform[J]. Computer & Digital Engineering, 2021, 49(12): 2544-2550. [52] 王姝爽, 马兆丰, 刘嘉微, 等. 区块链跨链安全接入与身份认证方案研究与实现[J]. 信息网络安全, 2022, 22(6): 61-72. WANG S S, MA Z F, LIU J W, et al. Research and imple-mentation of cross-chain security access and identity authentication scheme of blockchain[J]. Netinfo Security, 2022, 22(6): 61-72. [53] CHAO P. Research on cross-chain communication based on decentralized identifier[C]//Proceedings of the 2021 4th International Conference on Hot Information-Centric Networking, Nanjing, Nov 25-27, 2021. Piscataway: IEEE, 2021: 7-12. [54] WANG X. A credible transfer method of cross-chain assets based on DID and VC[C]//Proceedings of the IEEE 4th International Conference on Information Systems and Computer Aided Education, Dalian, Sep 24-26, 2021. Piscataway: IEEE, 2021: 238-242. [55] XIE T X, ZHANG Y, GAI K K, et al. Cross-chain-based decentralized identity for mortgage loans[C]//Proceedings of the 14th International Conference on Knowledge Science, Engineering, and Management, Tokyo, Aug 14-16, 2021.Cham: Springer, 2021: 619-633. [56] ZHONG T, SHI P C, CHANG J S. JointCloud cross-chain verification model of decentralized identifiers[C]//Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference, Austin, Oct 29-31, 2021. Piscataway: IEEE, 2021: 1-8. [57] ZHAO F X, YU J G, YAN B W. Towards cross-chain access control model for medical data sharing[J]. Procedia Computer Science, 2022, 202: 330-335. [58] REN Q, LIU H, LI Y, et al. Cloak: a framework for development of confidential blockchain smart contracts[C]//Proceedings of the 2021 International Conference on Distributed Computing Systems. Piscataway: IEEE, 2021: 1102-1105. [59] LI D, LIU J, TANG Z, et al. Agentchain: a decentralized cross-chain exchange system[C]//Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/the 13th IEEE International Conference on Big Data Science and Engineering, Rotorua, Aug 5-8, 2019. Piscataway: IEEE, 2019: 491-498. [60] WANG Q, ZHANG Y, BAO Z, et al. SorTEE: service-oriented routing for payment channel networks with scalability and privacy protection[J]. IEEE Transactions on Network and Service Management, 2022, 19(4): 3764-3780. [61] QASSE I A, ABU T M, NASIR Q. Inter blockchain communication: a survey[C]//Proceedings of the 6th Annual International Conference on Arab Women in Computing. New York: ACM, 2019: 1-6. [62] 颜阳, 王斌, 邹均. 区块链+赋能数字经济[M]. 北京: 机械工业出版社, 2018: 157-211. YAN Y, WANG B, ZOU J. Blockchain+empowering digital economy[M]. Beijing: China Machine Press, 2018: 157-211. |
[1] | ZHANG Wentao, HUANG Jianhua, GU Bin, NING Yuhao, GONG Zaiwei. DAGGraph: Blockchain Suitable for Mobile Ad Hoc Networks [J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(1): 252-264. |
[2] | WANG Xin, WANG Yasheng, ZHANG Shuhua, WANG Xinyu, XU Shuai. Green Supply Chain Emission Reduction Strategies and Smart Contracts Under Blockchain Technology [J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(1): 265-278. |
[3] | CHEN Xianyi, WANG Kang, DING Sizhe, FU Zhangjie. Survey on Progress of Blockchain Interoperability Technology [J]. Journal of Frontiers of Computer Science and Technology, 2024, 18(1): 75-92. |
[4] | HUO Wei, ZHANG Qionglu, OU Wei, HAN Wenbao. Survey on Blockchain-Based Cross-Domain Authentication for Internet of Things Terminals [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(9): 1995-2014. |
[5] | TIAN Haibo, YE Wan. Risk Management Policies and Analysis of Cross-Chain Digital Assets [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(9): 2219-2228. |
[6] | WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, LIANG Guangjun, MA Zhuo. Research on Blockchain Interoperability and Cross-Chain Technology [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(8): 1749-1775. |
[7] | LIU Qiang, SONG Baoyan, JI Wanting, WANG Junlu. Research on Malicious Attack Model of Blockchain Multi-mining Pools [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(7): 1719-1728. |
[8] | ZHANG Li, DUAN Mingda, WAN Jianxiong, LI Leixiao, LIU Chuyi. Research on Deep Reinforcement Learning Method for Throughput Optimization of Internet of Vehicles Blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(7): 1708-1718. |
[9] | PANG Jun, LIU Chen, HAO Kun, YU Minghe, XIN Junchang, JIANG Chengyang. Research on Editable Blockchain Model Based on Temporal Index [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(5): 1180-1188. |
[10] | LI Xinhang, LI Chao, ZHANG Guigang, XING Chunxiao. Overview of Blockchain and Database Fusion [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(4): 761-770. |
[11] | HUANG Minmin, YUAN Lingyun, PAN Xue, ZHANG Jie. Secure and Trusted Authentication Model Under Edge Computing and Multi-blockchain [J]. Journal of Frontiers of Computer Science and Technology, 2023, 17(3): 733-747. |
[12] | LIU Tonglai, ZHANG Zikai, WU Jigang. System Model and Access Control Schemes for Medical Image Collaborative Analysis [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(8): 1779-1791. |
[13] | WANG Qun, LI Fujuan, NI Xueli, XIA Lingling, WANG Zhenli, LIANG Guangjun. Survey on Blockchain Consensus Algorithms and Application [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1214-1242. |
[14] | XIONG Xiao, LI Leixiao, GAO Jing, GAO Haoyu, DU Jinze, ZHENG Yue, NIU Tieming. Research Progress of Blockchain in Internet of Vehicles Data Sharing [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(5): 1008-1024. |
[15] | HAN Gang, LYU Yingze, LUO Wei, WANG Jiaqian. Privacy Data Protection Scheme for Patients with Major Outbreaks [J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(2): 359-371. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
/D:/magtech/JO/Jwk3_kxyts/WEB-INF/classes/