Overview of Cross-Chain Identity Authentication Based on DID
With the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and...
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
2024-03-01
|
Series: | Jisuanji kexue yu tansuo |
Subjects: | |
Online Access: | http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdf |
_version_ | 1797271445999452160 |
---|---|
author | BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong |
author_facet | BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong |
author_sort | BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong |
collection | DOAJ |
description | With the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and sidechain have trust issues. At the same time, in the field of cross-chain identity authentication, there are problems that the identities of each chain are not unified and users do not have control over their own identities. Firstly, it systematically summarizes the development process and technical solutions of digital identity and cross-chain technology, and analyzes and compares four digital identity models and nine mainstream cross-chain projects. Secondly, by analyzing the main research results of cross-chain identity authentication in recent years, a general model of cross-chain identity authentication is designed, and the shortcomings of existing solutions are summarized. Then, it focuses on the cross-chain identity authentication implementation scheme based on DID, and analyzes the technical characteristics, advantages and disadvantages of different solutions. On this basis, three DID-based cross-chain identity authentication models are summarized, the main implementation steps are functionally described, and their advantages, limitations and efficiency are analyzed. Finally, in view of the shortcomings of the current DID-based cross-chain identity authentication model, its development difficulties are discussed and five possible future research directions are given. |
first_indexed | 2024-03-07T14:03:49Z |
format | Article |
id | doaj.art-3bd31744dbb740e59143d02d7122f6b6 |
institution | Directory Open Access Journal |
issn | 1673-9418 |
language | zho |
last_indexed | 2024-03-07T14:03:49Z |
publishDate | 2024-03-01 |
publisher | Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press |
record_format | Article |
series | Jisuanji kexue yu tansuo |
spelling | doaj.art-3bd31744dbb740e59143d02d7122f6b62024-03-07T02:27:38ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182024-03-0118359761110.3778/j.issn.1673-9418.2304003Overview of Cross-Chain Identity Authentication Based on DIDBAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong01. School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China 2. School of Computer Science and Technology, Hainan University, Haikou 570228, China 3. Warwick Manufacturing Group, The University of Warwick, Coventry CV4 8UW, United Kingdom 4. SSC Holding Company Ltd., Chengmai, Hainan 571924, China 5. School of Network and Information Security, Xidian University, Xi??an 710126, China 6. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100864, ChinaWith the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and sidechain have trust issues. At the same time, in the field of cross-chain identity authentication, there are problems that the identities of each chain are not unified and users do not have control over their own identities. Firstly, it systematically summarizes the development process and technical solutions of digital identity and cross-chain technology, and analyzes and compares four digital identity models and nine mainstream cross-chain projects. Secondly, by analyzing the main research results of cross-chain identity authentication in recent years, a general model of cross-chain identity authentication is designed, and the shortcomings of existing solutions are summarized. Then, it focuses on the cross-chain identity authentication implementation scheme based on DID, and analyzes the technical characteristics, advantages and disadvantages of different solutions. On this basis, three DID-based cross-chain identity authentication models are summarized, the main implementation steps are functionally described, and their advantages, limitations and efficiency are analyzed. Finally, in view of the shortcomings of the current DID-based cross-chain identity authentication model, its development difficulties are discussed and five possible future research directions are given.http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdfdecentralized identity; blockchain; cross-chain; identity authentication |
spellingShingle | BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong Overview of Cross-Chain Identity Authentication Based on DID Jisuanji kexue yu tansuo decentralized identity; blockchain; cross-chain; identity authentication |
title | Overview of Cross-Chain Identity Authentication Based on DID |
title_full | Overview of Cross-Chain Identity Authentication Based on DID |
title_fullStr | Overview of Cross-Chain Identity Authentication Based on DID |
title_full_unstemmed | Overview of Cross-Chain Identity Authentication Based on DID |
title_short | Overview of Cross-Chain Identity Authentication Based on DID |
title_sort | overview of cross chain identity authentication based on did |
topic | decentralized identity; blockchain; cross-chain; identity authentication |
url | http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdf |
work_keys_str_mv | AT baiyiruitianningleihongliuxuefengluxiangzhouyong overviewofcrosschainidentityauthenticationbasedondid |