Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain

To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology were adopted,and the dynamic password ,facial recognition and two-dimension code to modify the traditional identification method were combined...

Full description

Saved in:
Bibliographic Details
Main Authors: Qiuhan WU, Wei HU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018046
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530151994654720
author Qiuhan WU
Wei HU
author_facet Qiuhan WU
Wei HU
author_sort Qiuhan WU
collection DOAJ
description To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology were adopted,and the dynamic password ,facial recognition and two-dimension code to modify the traditional identification method were combined to design a kind of identification agreement on mobile terminal.The study analyzed the efficiently and security of the agreement,which reflected that the agreement could guarantee users’ privacy when it provide high-efficient identification.
format Article
id doaj-art-95a0006863e94f348624008514c9c094
institution Kabale University
issn 2096-109X
language English
publishDate 2018-09-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-95a0006863e94f348624008514c9c0942025-01-15T03:13:02ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-09-014606559554332Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchainQiuhan WUWei HUTo solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology were adopted,and the dynamic password ,facial recognition and two-dimension code to modify the traditional identification method were combined to design a kind of identification agreement on mobile terminal.The study analyzed the efficiently and security of the agreement,which reflected that the agreement could guarantee users’ privacy when it provide high-efficient identification.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018046SM2 algorithmblockchainidentity authenticationmobile terminal
spellingShingle Qiuhan WU
Wei HU
Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
网络与信息安全学报
SM2 algorithm
blockchain
identity authentication
mobile terminal
title Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
title_full Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
title_fullStr Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
title_full_unstemmed Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
title_short Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
title_sort design of identity authentication agreement in mobile terminal based on sm2 algorithm and blockchain
topic SM2 algorithm
blockchain
identity authentication
mobile terminal
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018046
work_keys_str_mv AT qiuhanwu designofidentityauthenticationagreementinmobileterminalbasedonsm2algorithmandblockchain
AT weihu designofidentityauthenticationagreementinmobileterminalbasedonsm2algorithmandblockchain