Research on Digital Identity Authentication Technology Based On Block Chain
نویسندگان
چکیده
Abstract In the traditional digital identity authentication, there are potential security threats caused by user’s personal privacy data being too centralized and vulnerable to attack, centralization will lead redundancy, poor permeability, lack of master control, high overall cost, abuse central rights. The authentication technology based on block chain can perfectly solve problem appeal. main innovative work includes design a new ID asynchronous Byzantine fault-tolerant algorithm dsbft using cryptography, computer network, other technologies, Block is designed dsbft, decentralized system chain. Hash used for signature acceptance improve efficiency scalability. order dust attack quantum computation, elliptic curve (ECDSA) encryption be combined with cryptography. results show that appeal scheme resist variety attacks has security.
منابع مشابه
constructing gender identity through narratives based on hallidays metafunctions
هویت, شکل دادن و بازنمایی آن در گفتمان, توجه بسیاری از محققان این رشته را به خود جلب کرده است. تحقیق حاضر بر شکل دادن به هویت جنسیتی هشت تن از دانشجویان ایرانی مشغول به تحصیل در دوره کارشناسی ارشد از طریق بررسی روایات آنان از تجربیات شخصی, متمرکز شده است. تحلیل داده ها در این تحقیق مشتمل بر سه بخش است: بخش اول شامل کدگذاری موضوعی روایات است که بر اساس آن هویت جنسیتی شرکت کنندگان در تحقیق بر اسا...
15 صفحه اولResearch on Authentication Technology of E-Commerce
With the continuous development of society and the requirements of economic integration, E-commerce is becoming a major economic model in the market , But it is facing a huge security problem in the course of its development。 In this paper it is starting from overview on e-commerce and problems to be solved on development of e-commerce :authentication is a technology of the most basic to ensure...
متن کاملIdentity Authentication Based on Two-Beam Interference
A two-factor identity authentication method on the basis of two-beam interference was presented. While verifying a user’s identity, a specific “phase key” as well as a corresponding “phase lock” are both mandatory required for a successful authentication. Note that this scheme can not only check the legality of the users, but also verify their identity levels so as to grant them hierarchical ac...
متن کاملResearch of Digital Character Recognition Technology Based on BP Algorithm
This paper describes the digital character recognition process and steps. Using artificial neural networks with momentum term and adaptive learning rate back-propagation algorithm to train and identify the ideal signal and noise signal containing the number of characters. By comparing the results to obtain that using the same network with the ideal signal and noise signal for training the netwo...
متن کاملResearch on Monitoring Technology of Digital Reservoir
Firstly, the concept of digital reservoir is proposed and discussed in the paper, then the method how to monitor dam’s state by digital means and how to transmit the monitoring data by GPRS technology is presented, and the method can monitor the dam’s state in real time and its advantages such as real-time, visibility, visualization are analyzed later. The indicators reflecting the safety of da...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: ['1742-6588', '1742-6596']
DOI: https://doi.org/10.1088/1742-6596/1802/3/032091