Overview of Cross-Chain Identity Authentication Based on DID

With the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and...

Full description

Bibliographic Details
Main Author: BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
Format: Article
Language:zho
Published: Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press 2024-03-01
Series:Jisuanji kexue yu tansuo
Subjects:
Online Access:http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdf
_version_ 1797271445999452160
author BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
author_facet BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
author_sort BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
collection DOAJ
description With the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and sidechain have trust issues. At the same time, in the field of cross-chain identity authentication, there are problems that the identities of each chain are not unified and users do not have control over their own identities. Firstly, it systematically summarizes the development process and technical solutions of digital identity and cross-chain technology, and analyzes and compares four digital identity models and nine mainstream cross-chain projects. Secondly, by analyzing the main research results of cross-chain identity authentication in recent years, a general model of cross-chain identity authentication is designed, and the shortcomings of existing solutions are summarized. Then, it focuses on the cross-chain identity authentication implementation scheme based on DID, and analyzes the technical characteristics, advantages and disadvantages of different solutions. On this basis, three DID-based cross-chain identity authentication models are summarized, the main implementation steps are functionally described, and their advantages, limitations and efficiency are analyzed. Finally, in view of the shortcomings of the current DID-based cross-chain identity authentication model, its development difficulties are discussed and five possible future research directions are given.
first_indexed 2024-03-07T14:03:49Z
format Article
id doaj.art-3bd31744dbb740e59143d02d7122f6b6
institution Directory Open Access Journal
issn 1673-9418
language zho
last_indexed 2024-03-07T14:03:49Z
publishDate 2024-03-01
publisher Journal of Computer Engineering and Applications Beijing Co., Ltd., Science Press
record_format Article
series Jisuanji kexue yu tansuo
spelling doaj.art-3bd31744dbb740e59143d02d7122f6b62024-03-07T02:27:38ZzhoJournal of Computer Engineering and Applications Beijing Co., Ltd., Science PressJisuanji kexue yu tansuo1673-94182024-03-0118359761110.3778/j.issn.1673-9418.2304003Overview of Cross-Chain Identity Authentication Based on DIDBAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong01. School of Cyberspace Security (School of Cryptology), Hainan University, Haikou 570228, China 2. School of Computer Science and Technology, Hainan University, Haikou 570228, China 3. Warwick Manufacturing Group, The University of Warwick, Coventry CV4 8UW, United Kingdom 4. SSC Holding Company Ltd., Chengmai, Hainan 571924, China 5. School of Network and Information Security, Xidian University, Xi??an 710126, China 6. Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100864, ChinaWith the emergence of concepts such as metaverse and Web3.0, blockchain plays a very important role in many fields. Cross-chain technology is an important technical means to achieve inter-chain interconnection and value transfer. At this stage, traditional cross-chain technologies such as notary and sidechain have trust issues. At the same time, in the field of cross-chain identity authentication, there are problems that the identities of each chain are not unified and users do not have control over their own identities. Firstly, it systematically summarizes the development process and technical solutions of digital identity and cross-chain technology, and analyzes and compares four digital identity models and nine mainstream cross-chain projects. Secondly, by analyzing the main research results of cross-chain identity authentication in recent years, a general model of cross-chain identity authentication is designed, and the shortcomings of existing solutions are summarized. Then, it focuses on the cross-chain identity authentication implementation scheme based on DID, and analyzes the technical characteristics, advantages and disadvantages of different solutions. On this basis, three DID-based cross-chain identity authentication models are summarized, the main implementation steps are functionally described, and their advantages, limitations and efficiency are analyzed. Finally, in view of the shortcomings of the current DID-based cross-chain identity authentication model, its development difficulties are discussed and five possible future research directions are given.http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdfdecentralized identity; blockchain; cross-chain; identity authentication
spellingShingle BAI Yirui, TIAN Ning, LEI Hong, LIU Xuefeng, LU Xiang, ZHOU Yong
Overview of Cross-Chain Identity Authentication Based on DID
Jisuanji kexue yu tansuo
decentralized identity; blockchain; cross-chain; identity authentication
title Overview of Cross-Chain Identity Authentication Based on DID
title_full Overview of Cross-Chain Identity Authentication Based on DID
title_fullStr Overview of Cross-Chain Identity Authentication Based on DID
title_full_unstemmed Overview of Cross-Chain Identity Authentication Based on DID
title_short Overview of Cross-Chain Identity Authentication Based on DID
title_sort overview of cross chain identity authentication based on did
topic decentralized identity; blockchain; cross-chain; identity authentication
url http://fcst.ceaj.org/fileup/1673-9418/PDF/2304003.pdf
work_keys_str_mv AT baiyiruitianningleihongliuxuefengluxiangzhouyong overviewofcrosschainidentityauthenticationbasedondid