Research on Digital Identity Authentication Technology Based On Block Chain

نویسندگان

چکیده

Abstract In the traditional digital identity authentication, there are potential security threats caused by user’s personal privacy data being too centralized and vulnerable to attack, centralization will lead redundancy, poor permeability, lack of master control, high overall cost, abuse central rights. The authentication technology based on block chain can perfectly solve problem appeal. main innovative work includes design a new ID asynchronous Byzantine fault-tolerant algorithm dsbft using cryptography, computer network, other technologies, Block is designed dsbft, decentralized system chain. Hash used for signature acceptance improve efficiency scalability. order dust attack quantum computation, elliptic curve (ECDSA) encryption be combined with cryptography. results show that appeal scheme resist variety attacks has security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

constructing gender identity through narratives based on hallidays metafunctions

هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...

15 صفحه اول

Research on Authentication Technology of E-Commerce

With the continuous development of society and the requirements of economic integration, E-commerce is becoming a major economic model in the market , But it is facing a huge security problem in the course of its development。 In this paper it is starting from overview on e-commerce and problems to be solved on development of e-commerce :authentication is a technology of the most basic to ensure...

متن کامل

Identity Authentication Based on Two-Beam Interference

A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user’s identity, a specific “phase key” as well as a corresponding “phase lock” are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical ac...

متن کامل

Research of Digital Character Recognition Technology Based on BP Algorithm

This paper describes the digital character recognition process and steps. Using artificial neural networks with momentum term and adaptive learning rate back-propagation algorithm to train and identify the ideal signal and noise signal containing the number of characters. By comparing the results to obtain that using the same network with the ideal signal and noise signal for training the netwo...

متن کامل

Research on Monitoring Technology of Digital Reservoir

Firstly, the concept of digital reservoir is proposed and discussed in the paper, then the method how to monitor dam’s state by digital means and how to transmit the monitoring data by GPRS technology is presented, and the method can monitor the dam’s state in real time and its advantages such as real-time, visibility, visualization are analyzed later. The indicators reflecting the safety of da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2021

ISSN: ['1742-6588', '1742-6596']

DOI: https://doi.org/10.1088/1742-6596/1802/3/032091