[1]谢峰,孟坤*,张旺,等.基于多PUF模组的身份标识与身份认证机制研究[J].计算机技术与发展,2024,34(08):73-77.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0147]
 XIE Feng,MENG Kun*,ZHANG Wang,et al.Research on Identity Generation and Identity Authentication Mechanism Based on Multi-PUF Modules[J].,2024,34(08):73-77.[doi:10.20165/j.cnki.ISSN1673-629X.2024.0147]
点击复制

基于多PUF模组的身份标识与身份认证机制研究

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
34
期数:
2024年08期
页码:
73-77
栏目:
网络空间安全
出版日期:
2024-08-10

文章信息/Info

Title:
Research on Identity Generation and Identity Authentication Mechanism Based on Multi-PUF Modules
文章编号:
1673-629X(2024)08-0073-05
作者:
谢峰孟坤*张旺许嘉鑫王启源
北京信息科技大学 计算机学院,北京 100101
Author(s):
XIE FengMENG Kun*ZHANG WangXU Jia-xinWANG Qi-yuan
School of Computer Science,Beijing Information Science and Technology University,Beijing 100101,China
关键词:
去中心化物理不可克隆功能身份认证可靠性硬件指纹
Keywords:
decentralizationphysical unclonable functionidentity authenticationreliabilityhardware fingerprints
分类号:
TP309.7
DOI:
10.20165/j.cnki.ISSN1673-629X.2024.0147
摘要:
身份认证是保护用户数据的第一道防线,为用户数据安全提供重要的保证。 现有的身份认证方法均依赖于凭证服务提供商(CSP)等权威中心,信任其自身管控性和安全防护能力。 但是,权威中心对身份标识具有绝对管控权,权威中心一旦失效将带来信息安全隐患。 基于此,提出了一种基于多 PUF 模组的身份标识生成及身份认证机制,将 PUF 硬件指纹引入认证机制中,设计了一种去中心化身份认证机制。 物理不可克隆功能(Physical Unclonable Function,PUF)描述了一种具有唯一性、不可篡改性的物理功能,已在身份认证领域得到了广泛应用,但其易受到使用环境等的影响而失效。 现有的基于 PUF 的身份认证方法均未提供对 PUF 芯片失效的容忍方案。 该文利用多 PUF 模组关联的方式,提出了提高身份认证机制可用性的解决方案。 最后,对所提出的机制从安全性、可行性和可靠性三个方面进行了讨论和证明。
Abstract:
Identity authentication serves as the primary line of defense for safeguarding user data, providing crucial assurance for the security of user information. Existing identity authentication methods rely on authoritative centers such as Credential Service Providers(CSP),trusting their self-control and security capabilities. However,authoritative centers possess absolute control over identity,and any failure in these centers may pose security risks to information. Considering this,we propose an identity generation and authentication mechanism based on multi - PUF modules, introducing PUF hardware fingerprints into the authentication process and designing a decentralized identity authentication mechanism.Physical Unclonable Function (PUF) describes a physically unique and tamper-resistant function widely applied in the field of identity authentication. However,PUFs are susceptible to environmental influences,leading to potential failures. Existing PUF-based identity authentication methods have not provided tolerance solutions for PUF chip failures. We propose a solution to enhance the usability of identity authentication mechanisms by utilizing a correlated approach with multiple PUF modules. Finally,we discuss and demonstrate the proposed mechanism in terms of security,feasibility,and reliability.

相似文献/References:

[1]马星晨,朱建涛,邵婧,等.一种基于属性的去中心化访问控制模型[J].计算机技术与发展,2018,28(09):118.[doi:10.3969/ j. issn.1673-629X.2018.09.024]
 MA Xing-chen,ZHU Jian-tao,SHAO Jing,et al.A Decentralized Access Control Model Based on Attribute[J].,2018,28(08):118.[doi:10.3969/ j. issn.1673-629X.2018.09.024]
[2]陈春玲,沈阳,余瀚.去中心化的征信系统模型研究[J].计算机技术与发展,2019,29(03):122.[doi:10.3969/ j. issn.1673-629X.2019.03.026]
 CHEN Chun-ling,SHEN Yang,YU Han.Research on Decentralized Model for Credit Information System[J].,2019,29(08):122.[doi:10.3969/ j. issn.1673-629X.2019.03.026]
[3]董黛莹,汪学明.基于区块链的电子医疗记录共享研究[J].计算机技术与发展,2019,29(05):121.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 026]
 DONG Dai-ying,WANG Xue-ming.Research on Electronic Medical Record Sharing Model Based on Blockchain[J].,2019,29(08):121.[doi:10. 3969 / j. issn. 1673-629X. 2019. 05. 026]
[4]许甜华,吴明礼.一种基于 TF-IDF 的朴素贝叶斯算法改进[J].计算机技术与发展,2020,30(02):75.[doi:10. 3969 / j. issn. 1673-629X. 2020. 02. 016]
 XU Tian-hua,WU Ming-li.An Improved Naive Bayes Algorithm Based on TF-IDF[J].,2020,30(08):75.[doi:10. 3969 / j. issn. 1673-629X. 2020. 02. 016]
[5]汪 菲,沈苏彬.一种基于区块链的可信数据共享解决方案[J].计算机技术与发展,2020,30(09):115.[doi:10. 3969 / j. issn. 1673-629X. 2020. 09. 021]
 WANG Fei,SHEN Su-bin.A Solution for Decentralized Data Sharing Based on Blockchain[J].,2020,30(08):115.[doi:10. 3969 / j. issn. 1673-629X. 2020. 09. 021]
[6]曹迪龙,杨文晖,苗 放.基于区块链的数字作品交易系统的研究[J].计算机技术与发展,2021,31(04):192.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 033]
 CAO Di-long,YANG Wen-hui,MIAO Fang.Research on Digital Works Transaction System Based on Block Chain[J].,2021,31(08):192.[doi:10. 3969 / j. issn. 1673-629X. 2021. 04. 033]
[7]陈 曦,沈苏彬.一种基于区块链的存储资源可信分配方法[J].计算机技术与发展,2022,32(02):130.[doi:10. 3969 / j. issn. 1673-629X. 2022. 02. 021]
 CHEN Xi,SHEN Su-bin.A Storage Resource Allocation Method Based on Blockchain[J].,2022,32(08):130.[doi:10. 3969 / j. issn. 1673-629X. 2022. 02. 021]
[8]李 铭,沈苏彬.一种基于区块链的自媒体版权管理方案[J].计算机技术与发展,2023,33(01):206.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 031]
 LI Ming,SHEN Su-bin.A Solution for Self-media Copyright Management Based on Blockchain[J].,2023,33(08):206.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 031]
[9]焦 洋,沈苏彬.一种基于区块链的物联网攻击防御方案[J].计算机技术与发展,2023,33(01):130.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 020]
 JIAO Yang,SHEN Su-bin.An IoT Attack Defense Solution Based on Blockchain[J].,2023,33(08):130.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 020]
[10]刘 江,沈苏彬.一种基于区块链的环境监测的可信管理[J].计算机技术与发展,2023,33(02):84.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 013]
 LIU Jiang,SHEN Su-bin.A Trusted Management of Environmental Monitoring Based on Blockchain[J].,2023,33(08):84.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 013]

更新日期/Last Update: 2024-08-10