Blockchain-based Multi-Purpose Authentication Method for Anonymity and Privacy
Yong Joo Lee1, Keon Myung Lee2

1YongJoo Lee, Department of Computer Science, Chungbuk National University, Cheongju, Chungbuk Korea.
2Keon Myung Lee, Department of Computer Science, Chungbuk National University, Cheongju, Chungbuk Korea.
Manuscript received on 19 August 2019 | Revised Manuscript received on 29 August 2019 | Manuscript Published on 16 September 2019 | PP: 409-414 | Volume-8 Issue-2S6 July 2019 | Retrieval Number: B10770782S619/2019©BEIESP | DOI: 10.35940/ijrte.B1077.0782S619
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Various applications using smart contract, a leading application technology of blockchain, are being rapidly introduced to the industrial sector. As a result, services in various fields are actively being developed. Currently, most of the services are offered on a variety of platforms, not blockchain-based. If these services are linked to prepaid features that provide anonymity in smart contracts, a more diverse service scenario could be created. In this paper, we propose scenarios that provide certification for various purposes based on smart contracts. It provides a scenario that provides the privacy of the contract signed by the customer while retaining the anonymity provided by blockchain. Smart contracts register keys that do not give a clue to guess the encoding keys and deliver hash functions of the child keys that change each time with authentication parameters.In addition, the master seed that can generate these authentication parameters is designed to be kept only by the user and the service provider to be able to verify them. It is proposed by considering both a single service provider transaction and a smart contract authentication model that is shared with a large number of service providers. To generate these child keys, we proposed a mechanism to use the method of generation of child keys based on the Elastic Curve Cryptography public-key method. Various attack scenarios were analyzed to complement the scenario and the efficiency of the proposed mechanism was analyzed. In addition, differences and excellence were compared by organizing scenarios that had the same purpose as scenarios in the relevant study.
Keywords: Blockchain, Authentication, Role-based Access Control, Anonymity, Privacy.
Scope of the Article: Authentication, Authorization, Accounting