A Review of Identity Authentication Based On Block
A Review of Identity Authentication Based On Block
DOI: 10.54254/2755-2721/30/20230094
Jiawei Li
Macau University of Science and Technology
1. Introduction
The network environment has become increasingly complex, and the demand for security and privacy
of personal information by users in the network has become more prominent.
To protect user data security and privacy, the application of identity authentication plays a key role.
Identity authentication is a process of verifying the authenticity of the authenticated party, based on the
idea of the authenticating party validating the characteristic information of the authenticated party to
confirm its validity and effectiveness [1]. In order to achieve the goal, designing novel identity
authentication methods is one of the crucial factors.
Originating from Bitcoin, blockchain was first introduced in 2008. Blockchain possesses
characteristics such as decentralization, openness, independence, tamper-proof information, and
anonymity. Based on these features, the information recorded on the blockchain is more transparent,
authentic, and reliable [2].
The design and application of identity authentication based on blockchain can address the security
vulnerabilities in the authentication process. Utilizing blockchain for storing user identity information
takes advantage of the decentralized, tamper-proof, and traceable nature of the blockchain itself,
ensuring the security and privacy of user information.
© 2023 The Authors. This is an open access article distributed under the terms of the Creative Commons Attribution License 4.0
(https://creativecommons.org/licenses/by/4.0/).
173
Proceedings of the 2023 International Conference on Machine Learning and Automation
DOI: 10.54254/2755-2721/30/20230094
The fundamental concept of blockchain is the "block," which contains a series of transactions and
other information. These blocks are linked together using hash functions from cryptography, forming a
growing chain, hence the name "blockchain."
Blockchain can be mainly categorized into the following four types [3].
Table 1. Classification of Blockchain.
Blockchain Type Characteristic
174
Proceedings of the 2023 International Conference on Machine Learning and Automation
DOI: 10.54254/2755-2721/30/20230094
175
Proceedings of the 2023 International Conference on Machine Learning and Automation
DOI: 10.54254/2755-2721/30/20230094
Hash algorithms are utilized to transform input data of arbitrary lengths into fixed-length output data.
They play a vital role in data integrity verification and identity authentication. Commonly used hash
algorithms include MD5 and SHA-256. For instance, in the study conducted by Dinesh et al. [7],
fingerprint scan images are converted into passwords using the MD5 algorithm, taking reference from
blockchain-based biometric identity authentication.
Symmetric encryption algorithms employ the same key for both encryption and decryption of data.
Well-known symmetric encryption algorithms include AES and DES. In the model of a blockchain-
based identity management system designed by Gupta et al. [8], the AES algorithm is used for
encrypting biometric features and demographic data.
In contrast, asymmetric encryption take the public key and the private key, for encryption, decryption,
digital signing, and verification. For example, in the research conducted by Yadav et al. [9] on the 5G-
AKA security protocol in communication systems, the elliptic curve algorithm (ECC) is used as an
encryption algorithm for security protection and key negotiation.
Table 2. Classification of encryption algorithms in identity authentication.
Encryption Algorithm Characteristic
4.2. Finance/Healthcare
In addition to its applications in the field of IoT, blockchain-based identity authentication has also been
extensively researched in the domains of finance and healthcare.
In the finance sector, blockchain is widely used in BFSI (Banking, Financial Services, and Insurance)
sectors. Akram et al. [12] provided numerous technical and business use cases, such as using smart
contracts as protocols for financial transactions, encrypting transactions, and using blockchain for
encrypted authentication in electronic payments.
176
Proceedings of the 2023 International Conference on Machine Learning and Automation
DOI: 10.54254/2755-2721/30/20230094
5. Summary
In conclusion, this paper provides a comprehensive overview of blockchain-based identity
authentication, covering its foundations, research directions, and practical applications. The potential of
this technology for improved development and wider adoption is evident. It is anticipated that
blockchain-based identity authentication will play a crucial role in addressing the security challenges
associated with identity verification and will find extensive applications in various domains in the future.
Further research and development in this area are essential to enhance its capabilities and ensure its
seamless integration into existing systems and processes.
References
[1] Liansong Zhou, Jie Yang, Pingzhang Tan, et al. (2009) Identity Authentication Technology and
Its Development Trend. Communications Technology, 42(10).
[2] Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System.
[3] Bashir, Imran. (2018) Mastering Blockchain: Distributed Ledger Technology, Decentralization,
and Smart Contracts Explaine (2nd Edition).
[4] Jintao Zhu, Yinzhen Wei, Xiaoxiao Shang. (2021) Decentralized Dynamic Identity
Authentication System Based on Blockchain. 2021 INSAI.
[5] Gang Zhao, Bingbing Di, Hui He. (2022) A novel decentralized cross-domain identity
authentication protocol based on blockchain. Transactions on emerging telecommunications
technologies, 33(1).
[6] Foteini Toutara, Georgios Spathoulas. (2020) A distributed biometric authentication scheme
based on blockchain. 2020 IEEE International Conference on Blockchain.
[7] A.D.Dinesh, C.D.P.Reddy, G.V.Gopi, et al. (2021) A Durable Biometric Authentication Scheme
via Blockchain. 2021 ICAECT.
[8] Shreya Gupta, A.K.Bairwa, S.S.Kushwaha, et al. (2023) Decentralized Identity Management
System using the amalgamation of Blockchain Technology. 2023 3rd International Conference
on Intelligent Communication and Computational Techniques
[9] A.K.Yadav, An Braeken, Manoj Misra, et al. (2023) A Provably Secure and Efficient 5G-AKA
Authentication Protocol using Blockchain. IEEE 20th Consumer Communications &
Networking Conference.
[10] Gongguo Zhang, Zhou Wan. (2021) Blockchain-based IoT security authentication system. 2021
International Conference on Computer, Blockchain and Financial Development (CBFD)
[11] Lijun Zhang, Liang Hu, Wenbo Xie, et al. (2022) Distributed Authentication Method for Power
Grid Based on Consortium Blockchain. 2022 6th International Conference on Wireless
Communications and Applications (ICWCAPP)
[12] Md Akram, Anshuman Sen. (2022) A case study Evaluation of Blockchain for digital identity
verification and management in BFSI using Zero-Knowledge Proof. 2022 International
Conference on Decision Aid Sciences and Applications (DASA)
[13] Gongguo Zhang, Zuo Ou. (2021) Personal health data identity authentication matching scheme
based on blockchain. 2021 International Conference on Computer, Blockchain and Financial
Development (CBFD)
177
Proceedings of the 2023 International Conference on Machine Learning and Automation
DOI: 10.54254/2755-2721/30/20230094
[14] Saurabh Shuklaa, Subhasis Thakur, Shahid Hussain, et al. (2021) Identifification and
Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based
Blockchain Model. Internet of Things, 15:100422
178