2020
DOI: 10.1155/2020/8849363
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Blockchain Identity Authentication Scheme Implemented in Fog Computing

Abstract: In a fog computing environment, lots of devices need to be authenticated in order to keep the platform being secured. To solve this problem, we turn to blockchain techniques. Unlike the identification cryptographic scheme based on elliptic curves, the proposed 2-adic ring identity authentication scheme inherits the high verification efficiency and high key distribution of sequence ciphers of 2-adic ring theory, and this algorithm adds identity hiding function and trading node supervision function by design. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Wang and Jiang [2] utilize two-adic ring theory [114] and related arithmetic algorithms to authenticate identities in a consortium blockchain for a fog computing environment. The two-adic ring is a finite ring that can be used to represent any bit string contained within a finite field.…”
Section: A Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang and Jiang [2] utilize two-adic ring theory [114] and related arithmetic algorithms to authenticate identities in a consortium blockchain for a fog computing environment. The two-adic ring is a finite ring that can be used to represent any bit string contained within a finite field.…”
Section: A Cloud Computingmentioning
confidence: 99%
“…An identity authentication system is required to keep the environments secure because of this decentralization of the network. Though blockchain is a relatively new technology, it possesses properties of transparency, immutability, credibility, tamper resistance, traceability, and decentralization necessary for various applications [2]. Using blockchain for identity management can give individuals ownership of their identities by providing a global ID that can be used for diverse purposes.…”
Section: Introductionmentioning
confidence: 99%
“…In Ref. [1], a cross-domain authentication scheme based on certificateless cryptosystem is proposed. This scheme combined with the PKI cryptographic system can anonymously track the identity of the terminal entity.…”
Section: Related Workmentioning
confidence: 99%
“…A blockchain‐based identity authentication scheme in a fog computing environment is proposed in Ref. [2]. This scheme proposes a two‐element ring identity authentication scheme based on the two‐element ring theory sequence cipher, so this scheme has high verification efficiency and key distribution.…”
Section: Related Workmentioning
confidence: 99%