skip to main content
10.1145/3617184.3623448acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Research on Application of Identity Authentication Encryption Technology in Blockchain Scene

Authors Info & Claims
Published:28 December 2023Publication History

ABSTRACT

With the wide application of computer network and intelligent terminal, the application of blockchain technology is rapidly popularized, and the corresponding information security issues become increasingly important. This paper introduces the data encryption standard DES of symmetric encryption algorithm, and discusses the public-key infrastructure system PKI. It is a third-party platform to ensure the security of information during transmission, mainly responsible for issuing certificates with digital signature of CA center and managing public and private-keys needed in RSA algorithm. Several asymmetric encryption algorithms are studied, focusing on RSA asymmetric encryption algorithm, and the method of encrypting public-key decryption with private-key is designed and implemented to solve the problem of information authenticity identification, i.e., identity authentication namely identity authentication. RSA public-key generation, information encryption and decryption are designed, and RSA key generator module, encryption module and decryption module are realized. The results show that RSA algorithm is feasible and safe in blockchain scene.

References

  1. RIVEST R L, SHAMIR A, ALDEMAN L. A method for obtaining digital signatures and public−key cryptosystems. Communications of the ACM, 1978, 21(2):120-126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Zhang Xuefang. Optical fiber broadband access technology. Beijing: Beijing University of Posts and Telecommunications Press, 2016.Google ScholarGoogle Scholar
  3. Wang Lina, Guo Chi, Li Peng. Information Hiding Technology Experiment Course. Wuhan: Wuhan University Press, 2004.Google ScholarGoogle Scholar
  4. KIMUR A S, YONEYAMA K. Security proof of identity−based signature under RSA assumption, reconsidered/2016 international symposium on information theory and itsapplications. Monterey, CA: IEEE, 2016:86-90.Google ScholarGoogle Scholar
  5. Yang Xiaofeng, Zhang Ying, Deng Zhimin. Research on trusted QR code technology based on PKI. Science and Technology Innovation and Application, 2015(33): 89-90.Google ScholarGoogle Scholar
  6. Zhang Hua, Cui Huijuan, Tang Kun. A fast implementation scheme of digital signature system based on RSA algorithm. Computer Engineering, 2006, 32 (3): 156-157.Google ScholarGoogle Scholar
  7. Xu Shaobo, Yin Bo. An asymmetric encryption solution for form sensitive information based on PKI digital certificate. computer applications and software, 2010, 27 (10): 291-292.Google ScholarGoogle Scholar
  8. Chen Jun. Research on the security application of QR code technology in mobile terminals. Guangzhou: Guangdong University of Technology, 2015.Google ScholarGoogle Scholar
  9. Chen Jingwen, Xia Shiwen, Lin Yong. Application of. RSA encrypted QR code in security traceability system. Journal of Ningbo Institute of Technology, 2016, 28 (4): 31-36.Google ScholarGoogle Scholar
  10. YAJAM H A, AHMADABADI Y K, AKHAEE M. Deniable encryption based on standard RSA with OAEP//2016 8th international symposium on telecommunications. Tehran: IEEE, 2016:84-88.Google ScholarGoogle Scholar
  11. Han Lidong, Wang Xiaoyun, Xu Guangwu. Attack analysis of small CRT decryption index in. RSA cryptosystem. China Science: Information Science, 2011, 41(2): 173-180.Google ScholarGoogle Scholar

Index Terms

  1. Research on Application of Identity Authentication Encryption Technology in Blockchain Scene
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCSIE '23: Proceedings of the 8th International Conference on Cyber Security and Information Engineering
          September 2023
          370 pages
          ISBN:9798400708800
          DOI:10.1145/3617184

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 December 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)15
          • Downloads (Last 6 weeks)6

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format